SHA-3 is KECCAK

Chris Cain clcain at uncg.edu
Fri Jan 17 07:00:37 PST 2014


On Friday, 17 January 2014 at 14:06:57 UTC, Kagamin wrote:
> Doesn't TCP take care of that?

For a packet, yes. In general you can assume that if a transfer 
completes under TCP then it is very likely correct. That's the 
way TCP is designed. If you want to check the entire file at the 
end, MD5 could theoretically be done as a sanity check. I'd still 
use SHA-2 (in the form of a digital signature, obviously) 
minimally if your intention is to ensure it hasn't been tampered 
with, but the speed, simplicity, and availability of MD5 can be 
arguments for its use as long as you're not actually concerned 
about security.


More information about the Digitalmars-d mailing list