Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 4 additions & 0 deletions menu/navigation.json
Original file line number Diff line number Diff line change
Expand Up @@ -4527,6 +4527,10 @@
{
"label": "Equivalence between Object Storage actions and IAM permissions",
"slug": "s3-iam-permissions-equivalence"
},
{
"label": "Supported checksums",
"slug": "supported-checksums"
}
],
"label": "Additional Content",
Expand Down
26 changes: 26 additions & 0 deletions storage/object/reference-content/supported-checksums.mdx
Original file line number Diff line number Diff line change
@@ -0,0 +1,26 @@
---
meta:
title: Supported checksums
description: Discover the checksums supported by Scaleway Object Storage.
content:
h1: Supported checksums
paragraph: Discover the checksums supported by Scaleway Object Storage.
tags: object storage checksum supported aws object integrity
dates:
validation: 2024-11-14
posted: 2024-11-14
categories:
- network
---

Checksums are critical components in ensuring data integrity within object storage systems. They are calculated values, typically a hash or a cyclic redundancy check (CRC), obtained from the content of an object. By comparing the stored checksum with one recalculated during data retrieval, storage systems can detect and often correct errors caused by corruption, transmission issues, or hardware failures.

Scaleway Object Storage supports several checksum algorithms that allow you to verify the integrity of your objects:

- **CRC32**: a non-cryptographic checksum that generates a 32-bit hash value used to detect errors in data transmission by applying a specific cyclic redundancy check (CRC) algorithm.

- **CRC32C**: a checksum algorithm that uses the Castagnoli polynomial for improved error-detection performance over the standard CRC32.

- **SHA-1**: a cryptographic Secure Hash Algorithm (SHA) that generates a 160-bit (20-byte) hash value from input data.

- **SHA-256**: a cryptographic Secure Hash Algorithm that generates a 256-bit unique hash value, preferred for modern security protocols due to SHA-1 vulnerabilities.