diff --git a/menu/navigation.json b/menu/navigation.json index 82904cc59b..ff5606a2d0 100644 --- a/menu/navigation.json +++ b/menu/navigation.json @@ -4527,6 +4527,10 @@ { "label": "Equivalence between Object Storage actions and IAM permissions", "slug": "s3-iam-permissions-equivalence" + }, + { + "label": "Supported checksums", + "slug": "supported-checksums" } ], "label": "Additional Content", diff --git a/storage/object/reference-content/supported-checksums.mdx b/storage/object/reference-content/supported-checksums.mdx new file mode 100644 index 0000000000..19579017d1 --- /dev/null +++ b/storage/object/reference-content/supported-checksums.mdx @@ -0,0 +1,26 @@ +--- +meta: + title: Supported checksums + description: Discover the checksums supported by Scaleway Object Storage. +content: + h1: Supported checksums + paragraph: Discover the checksums supported by Scaleway Object Storage. +tags: object storage checksum supported aws object integrity +dates: + validation: 2024-11-14 + posted: 2024-11-14 +categories: + - network +--- + +Checksums are critical components in ensuring data integrity within object storage systems. They are calculated values, typically a hash or a cyclic redundancy check (CRC), obtained from the content of an object. By comparing the stored checksum with one recalculated during data retrieval, storage systems can detect and often correct errors caused by corruption, transmission issues, or hardware failures. + +Scaleway Object Storage supports several checksum algorithms that allow you to verify the integrity of your objects: + +- **CRC32**: a non-cryptographic checksum that generates a 32-bit hash value used to detect errors in data transmission by applying a specific cyclic redundancy check (CRC) algorithm. + +- **CRC32C**: a checksum algorithm that uses the Castagnoli polynomial for improved error-detection performance over the standard CRC32. + +- **SHA-1**: a cryptographic Secure Hash Algorithm (SHA) that generates a 160-bit (20-byte) hash value from input data. + +- **SHA-256**: a cryptographic Secure Hash Algorithm that generates a 256-bit unique hash value, preferred for modern security protocols due to SHA-1 vulnerabilities. \ No newline at end of file