Secure Hash Algorithm
SHA (Secure Hash Algorithm) was designed by the National Security Agency
(NSA) in 1993 as the algorithm of the Secure Hash Standard (SHS, FIPS 180).
It was modeled after MD4 with additional improvements. An undisclosed
security problem prompted the NSA to release an improved SHA-1 in 1995.
Florent Chabaud and Antoine Joux later discovered a differential collision
attack against SHA in 1998. There are currently no known cryptographic
attacks against SHA-1.
It is also described in the ANSI X9.30 (part 2) standard. SHA-1 produces a
160-bit (20 byte) message digest. Although slower than MD5, this larger
digest size makes it stronger against brute force attacks.
What is Advanced CheckSum Verifier (ACSV)?
The Advanced CheckSum Verifier is an small,
GUI-driven Windows checksum utility
intended for creation and verification the
checksum files
both in SFV and MD5SUM formats.
ACSV will help Windows users to protect the integrity of their files by
using the CRC32 or MD5
checksum calculation algorithms.
ACSV will useful when necessary to verify the accuracy of files burned to
CD-R(W) or transmitted over network, or for files comparison, or for
detection of corrupted or tampered files. Adding an little checksum file to
your data files will allow easily to verify their integrity at any time in
further and allow you to reveal what files has been changed.
ACSV is especially effective if you have many files, many subdirectories,
or both. And it's extremely fast and lightweight.
ACSV uses checksum files fully compatible with popular
md5 utility for
MD5 and
SFV (Simple File Verification) for
CRC32.
Read more about ACSV…
See other screen shots of ACSV…
Order ACSV Now!
Download! - [an error occurred while processing this directive]b EXE-file with installer
|