Communiquez avec les autres et partagez vos connaissances professionnelles

Inscrivez-vous ou connectez-vous pour rejoindre votre communauté professionnelle.

Suivre

How do cryptography-based keys ensure the validity of data transferred across the network?

user-image
Question ajoutée par Faseeh Mohd koya , IT SUPPORT ENGINEER [L2] , Ministry of Sports and Youth
Date de publication: 2016/05/03
Elfatih Salih
par Elfatih Salih , Support and development manager , Almadina Newspaper

Each IP packet is assigned a checksum, so the checksums must match on both receiving and transmitting ends. If not this means that the data was modified or corrupted.

More Questions Like This