Adsure Packaging Limited
call us on: +86-0755-61148000-815
Categories
Adsure Packaging Limited
Knowledge
Home > Knowledge > Content

Computer systems

Adsure Packaging Limited | Updated: Dec 04, 2015

In cryptographic terminology, cryptographic hash functions and cryptographic signatures are used to add a tamper-evident layer of protection to document, often referred to as an electronic signature.

Hardware encrypted full disk drives utilise tamper-evident cases, so when it is retrieved the owner can be assured that the data has not been compromised, thus preventing costly further actions such as notifying the data owners.[5]

The document, email, or file to be protected is used to generate a signed hash, a number generated from the contents of the document. Any change to the document, no matter how trivial, such as changing a single bit from a 1 to a 0, will cause it to have a different hash, which will make the signature invalid. To alter a document while purposely maintaining the same hash, assuming the hash function and the program implementing it are properly designed, is extremely difficult. See avalanche effect and hash collision.


Contact Us

ADD: Room 705-706,7/F,China Insurance Group Building,141Des Voeux Road Central ,Central, HK.

China Line: 

Tel:86-755-61148000-815

Mobile:86-18018772752

Email: sales01@tamper-evident.com

Skype: gzbq11

Whatsapp:0086-18018772752

Copyright © Adsure Packaging Limited