AppDevTools
AppDevTools
/
Cryptography and Security
Checksum Calculator

Checksum Calculator

client
double-caret-vertical

Documentation

What is a checksum?

A checksum is a calculated value using a cryptographic hash function to verify the integrity of data such as a binary file. Checksums are mostly used for comparing between the source of a file and a copy of it to ensure that the copy is identical to the source.

For example, when downloading an ISO file especially an ISO image from the official site, generally, several checksums in different algorithms are also provided on the download page; e.g. MD5 and SHA-1.

You can use your preferred algorithm to verify the integrity of your copy of the file if it's genuine. In other words, the calculated checksum must be exactly the same as the provided one.

Additionally, checksums are case insensitive, it doesn't matter if they are in lowercase or uppercase. A checksum is also known as a hash sum, hash value, hash code, or simply hash.


How to verify the checksum of a file on Linux

Verifying the checksum of a file on Linux is very simple and straightforward. Most Linux distributions already came with the command line tools for verifying checksums in various algorithms as listed below.

  • MD5 - md5sum
  • SHA-1 - sha1sum
  • SHA-224 - sha224sum
  • SHA-256 - sha256sum
  • SHA-384 - sha384sum
  • SHA-512 - sha512sum

For example, you can verify the SHA-1 checksum of the Debian 10.1 ISO with this command.

sha1sum debian-10.1.0-amd64-netinst.iso

It will result in the following checksum which is exactly the same as the SHA-1 checksum listed on the download page. Therefore, this downloaded ISO file is error free and not corrupted. You can use it in production with peace of mind.

c467e9bf37374e3fc63aa6aa22dbbe14d97ae3eb  debian-10.1.0-amd64-netinst.iso

What to do if a checksum doesn't match

If the calculated checksum of a file doesn't match the provided one from a trusted source, this means the two files are not the same. Either the copy is corrupted or the source has been modified. A small change to the file even just a single byte will result in a completely different checksum as both files are no longer identical.

You should avoid using a defected copy of the source at all costs to prevent further damage it may cause. So just simply don't use it and redownload the file to check it again especially from a different server if it's an ISO image.

Related Tools

Hash Generator

Hash Generator is a free online developer tool to generate the hash value of a string. Supports MD5, SHA-1, SHA-224, SHA-256, SHA-512, SHA-384, SHA-3, and RIPEMD160.

HMAC Generator

HMAC Generator is a free online developer tool to generate an HMAC from a string with a secret key. Supports MD5, SHA-1, SHA-224, SHA-256, SHA-512, SHA-384, SHA-3, and RIPEMD160.

Password Generator

Password Generator is a free online developer tool to generate strong and secure passwords that are difficult to crack with highly customizable options.

Bcrypt Generator

Bcrypt Generator is a free online developer tool to generate a bcrypt hash from a string or check if a string matches a bcrypt hash.

UUID Generator

UUID Generator is a free online developer tool to generate one or multiple UUIDs in version 1 (timestamp) and version 4 (random). Supports uppercase and braces.

Share