Start networking and exchanging professional insights

Register now or log in to join your professional community.

Follow

How do cryptography-based keys ensure the validity of data transferred across the network?

user-image
Question added by Faseeh Mohd koya , IT SUPPORT ENGINEER [L2] , Ministry of Sports and Youth
Date Posted: 2016/05/03
Elfatih Salih
by Elfatih Salih , Support and development manager , Almadina Newspaper

Each IP packet is assigned a checksum, so the checksums must match on both receiving and transmitting ends. If not this means that the data was modified or corrupted.

More Questions Like This