Data Integrity

/ˈdeɪ.tə ɪnˈtɛɡ.rɪ.ti/

noun — "because corrupted data is like ordering pizza and getting a salad instead."

Data Integrity is the assurance that information is accurate, consistent, and reliable over its lifecycle. It guarantees that data remains unaltered during storage, transmission, or processing unless explicitly modified through authorized operations. Maintaining Data Integrity is crucial for trust in IT systems, whether in databases, file systems, cloud services, or communication networks.

Message Authentication Code

/ɛm æk/

n. “Trust the message — not the path it traveled.”

MAC, short for Message Authentication Code, is a cryptographic construct designed to answer a deceptively simple question: has this message been altered, and did it come from someone who knows the secret? A MAC provides integrity and authenticity, but not secrecy. The contents of the message may be visible — what matters is that any tampering is detectable.

SHA1

/ˌes-eɪtʃ-ˈwʌn/

n. “Good enough… until it wasn’t.”

SHA1 is a cryptographic hash function born in an era when the internet still believed in handshakes, trust, and the idea that computational limits would politely remain limits. Designed by the NSA and standardized in the mid-1990s, SHA1 takes arbitrary input and produces a 160-bit fingerprint — a fixed-length digest meant to uniquely represent data, documents, passwords, or entire software releases.