Start networking and exchanging professional insights

Register now or log in to join your professional community.

Follow

How do cryptography-based keys ensure the validity of data transferred across the network?

user-image
Question added by Faseeh Mohd koya , IT SUPPORT ENGINEER [L2] , Ministry of Sports and Youth
Date Posted: 2016/05/03
Elfatih Salih
by Elfatih Salih , Support and development manager , Almadina Newspaper

Each IP packet is assigned a checksum, so the checksums must match on both receiving and transmitting ends. If not this means that the data was modified or corrupted.

More Questions Like This

Do you need help in adding the right keywords to your CV? Let our CV writing experts help you.