Has Your Data Got Corrupted? Step By Step Guide to Find It

It is critical to recognize whether data got corrupted with or tampered with.

The survey says that $8 billion data got corrupted in 2018, $11.5 billion data got corrupted in $2019 and $20 billion data got corrupted in 2020.

The research says that $40 billion data will be get corrupted in 2021.

Data got corrupted_Statistics
Data corrupted Analysis

It is the necessary to protect our data.

What is the remedial measure to protect our data?

A hashing program can be used to determine whether data has changed or stayed unchanged.

 A hashing application uses a hash function to return a (typically considerably shorter) result from data or a file. 

The value returned is always the same when the same hash is performed on the same data. The hash value returned will change if the data is changed in any way.

This method can be used to determine whether or not security breaches have occurred.

Why Hash Calculator Tool?

  • It’s easy and practical to compute the hash, but “difficult or impossible to re-generate the original input if only the hash value is known.”
  • It’s difficult to create an initial input that would match a specific desired output.

How to use the Hash Calculator Tool?

Here is a step-by-step guide to determining the Hash value and determining whether or not the data has been damaged.

Step-1: Create a File

The first step is you should create a file.

  1. Open the Notepad on your computer and type some text.
  2. Choose File->Save.
  3. Navigate to Desktop.
  4. Save the file with the name “Test”.
Corrupted Data

You’ve created a Text file in Notepad and saved it. So, What Happens Next?

After that, you should set up a Hash Calculator.

Step-2: Install a Hash Calculator Tool called HashCalc

Hash Calculator is a free tool that calculates MD2, MD5, SHA-1, SHA-256, SHA-384, SHA-512 hash of text or a file.

  1. Open a web browser and navigate to http://www.slavasoft.com/download.htm

You will get the below Screen.

Hash Calculator

2. Click Download in the HashCalc 2.02 row

3. Open the hashcalc.zip file and run the setup.exe file inside

Hash Calculator Installation

4. Follow the installation wizard to install Hash Calculator.

5. Once the installation is complete, click the Finish button.

Now You can see the Hashcalc is installed and running.

Hash Calculator with Hash Types

As you can see, Hashcalc is now installed and operational.

Then, do the Step-4.

Step-3: Calculate the Hash of a test.txt file

  1. Choose the Data Format: File in the Hash calculator.
  2. Click the next field Data and navigate to Desktop.
  3. Then Choose the Test.txt file to calculate Hash Value
  4. Uncheck the HMACC.
  5. All hash types except MD5 should be unchecked. You’ll start by calculating the MD5. As a result, uncheck all of the other Hash types.
  6. Click the calculate button.

What value you got? Answer may vary.

Hash Value MD5

Here you got the value: 6cc4dbca7d93bf0d95feaa43a64a6d4e

Step-4: Make a change to the Test.txt file

  1. Open the Text.txt file and modify the data, such as deleting a letter, or adding a space or period
Data got corrupted

2. Save the File and close the Notepad.

Step-5: Calculate a new Hash of the Test.txt file to check data got corrupted or not

  1. Open the Hash Calculator.
  2. Except for MD5, make sure the checkboxes for all other hash types are unchecked.
  3. Click the calculate button.

Now, What is the value next to MD5?

As you can see, the hash value has changed as a result of the data being updated.

Here the Hash value is: 32406ab3d06f13cf707e62d6b38f96bc

So, this is the method to find whether the data got corrupted or not.

We have only used MD5 in this case. You can also test with different hash types.

Depending on the hash type, each hash value may differ. This is due to the fact that several hashes employ varying numbers of bits to generate a hash.

You can find the different types of Hash algorithms here.

In Closing.. – Data got corrupted or not

When someone or a program tries to access unauthorized data, a security breach occurs. This is one approach for determining whether or not data has been corrupted or tampered with. That is, whether or not any security breaches occurred.

Prevent cyber security breaches!!!