File integrity is the condition where all the data values in the file are correct. They have not been altered, erased, or damaged.
Validation is the process of checking file integrity. Hash values are one method used to verify file validity and integrity. Two files could also be compared, byte for byte, but that is slow for big files. Computing the file hash value and comparing it against the known, expected, stored hash value is much quicker.
This is computer science terminology. It has nothing to do with verification of document facts, signatures or notarization by a notary public. It is verification that the bytes in a file have not been corrupted.
Google uses this same terminology when using hash values for file integrity checking and validation. See https://cloud.google.com/storage/docs/hashes-etags
Blockchain uses different algorithms for different purposes. The popular Bitcoin cryptocurrency uses SHA-256 (Secure Hash Algorithm 2, SHA-2, 256 bit hash value). SHA-2 was designed by the United States National Security Agency (NSA). Details are available at https://en.bitcoin.it/wiki/Block_hashing_algorithm
Ethereum cryptocurrency uses hashing algorithm KECCAK-256 and has advantages for smart contracts. |