Computer Science, asked by ArjunTomar8010, 1 year ago

For ensuring transaction integrity with hash function

Answers

Answered by choudhary21
0
A hash function (like MD5 or SHA-256) is used to generate a hash value for the data you want to transfer. You then transfer both the data and its hash. After the transfer, you hash the data again, on your machine, and compare it to the original one. If they are equal, then the transfer is successful
Similar questions