Both CRC and hash methods can be used to verify the integrity of the original data. Why do most systems uses hash method nowadays?
Asked
Active
Viewed 6,234 times
2 Answers
9
CRC was designed to prevent transmission errors, not malicious action.
Therefore, it isn't collision resistant.
In particular, the linear properties of CRC codes even allow an attacker to modify a message in such a way as to leave the check value unchanged

SLaks
- 868,454
- 176
- 1,908
- 1,964
3
HASH methods (ONE WAY ENCRYPTION) are more complex (and powerful) than simple check codes (CRC). Not only they could be used to verify data integrity, but they also make sure no one could infer the original message that originated the hash value.

Pablo Santa Cruz
- 176,835
- 32
- 241
- 292
-
@Rook: I know. That's why I clarified: ONE WAY ENCRYPTION. It's technically not **encryption** but it's usually called that. Here's some of that in WIKIPEDIA: http://en.wikipedia.org/wiki/One-way_encryption – Pablo Santa Cruz Feb 24 '11 at 01:33
-
@Rook: cool fellow. I am not asking you to remove your -1. :-) – Pablo Santa Cruz Feb 24 '11 at 01:37