Back to Security Pattern Catalog

Error Detection and Correction

Classification Key : Core Security, Tampering


Data residing on storage media or in transit across communication links is often susceptible to errors. This can occur because of bugs in the local system, or because of active attempts by adversaries to corrupt the data. How can data be protected from tampering at the intermediaries?


Add redundancy to data to facilitate detection of and recovery from errors. This can be done by simple parity checking or integrity checking based on some hash values.

Known Uses

RAID array. CRC check in disk storage

Related Patterns

Comparator Checked Fault Tolerant System


Open Group Catalog


Parity, Hash Value, Integrity


Last modified: May 05, 2012

Conceived and Maintained by: Munawar Hafiz