Often, files that are distributed over the Internet are provided with a checksum number for security and file validity. While they are not needed, some people may wish to verify their downloads with the provided checksum numbers. In addition to checksums, there are code signing and encryption algorithms that can be used for verifying distributed files and applications.