Skip to content

Commit fd18abb

Browse files
docs(s3): add reference content on supported checksums MTA-5255 (#3984)
* docs(s3): add reference content on supported checksums MTA-5255 * docs(s3): update * docs(s3): add intro * Apply suggestions from code review Co-authored-by: Jessica <[email protected]> --------- Co-authored-by: Jessica <[email protected]>
1 parent 2c2b17b commit fd18abb

File tree

2 files changed

+30
-0
lines changed

2 files changed

+30
-0
lines changed

menu/navigation.json

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4515,6 +4515,10 @@
45154515
{
45164516
"label": "Equivalence between Object Storage actions and IAM permissions",
45174517
"slug": "s3-iam-permissions-equivalence"
4518+
},
4519+
{
4520+
"label": "Supported checksums",
4521+
"slug": "supported-checksums"
45184522
}
45194523
],
45204524
"label": "Additional Content",
Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
---
2+
meta:
3+
title: Supported checksums
4+
description: Discover the checksums supported by Scaleway Object Storage.
5+
content:
6+
h1: Supported checksums
7+
paragraph: Discover the checksums supported by Scaleway Object Storage.
8+
tags: object storage checksum supported aws object integrity
9+
dates:
10+
validation: 2024-11-14
11+
posted: 2024-11-14
12+
categories:
13+
- network
14+
---
15+
16+
Checksums are critical components in ensuring data integrity within object storage systems. They are calculated values, typically a hash or a cyclic redundancy check (CRC), obtained from the content of an object. By comparing the stored checksum with one recalculated during data retrieval, storage systems can detect and often correct errors caused by corruption, transmission issues, or hardware failures.
17+
18+
Scaleway Object Storage supports several checksum algorithms that allow you to verify the integrity of your objects:
19+
20+
- **CRC32**: a non-cryptographic checksum that generates a 32-bit hash value used to detect errors in data transmission by applying a specific cyclic redundancy check (CRC) algorithm.
21+
22+
- **CRC32C**: a checksum algorithm that uses the Castagnoli polynomial for improved error-detection performance over the standard CRC32.
23+
24+
- **SHA-1**: a cryptographic Secure Hash Algorithm (SHA) that generates a 160-bit (20-byte) hash value from input data.
25+
26+
- **SHA-256**: a cryptographic Secure Hash Algorithm that generates a 256-bit unique hash value, preferred for modern security protocols due to SHA-1 vulnerabilities.

0 commit comments

Comments
 (0)