1. National Institute of Standards and Technology (NIST)
Special Publication 800-183
Networks of 'Things'
July 2016. Section 3.3.2
"Data Confidentiality
Integrity
and Origin Authentication
" discusses the need for data integrity and mentions cryptographic mechanisms like digital signatures
which are fundamentally based on hashing
to ensure data has not been altered.
2. CertNexus
ITS-110 Exam Objectives
Version 2.0. Domain 3.3
"Given a scenario
implement security measures for IoT devices
" covers the application of cryptographic controls. Hashing is a primary cryptographic control used to ensure the integrity of data and software.
3. Paar
C.
& Pelzl
J.
Understanding Cryptography: A Textbook for Students and Practitioners. (Material commonly used in university curricula). Chapter 11
"Hash Functions
" Section 11.1.2
"Digital Signatures
" explains that a core application of hash functions is to compute a short digest of a message or file for integrity verification as part of a digital signature scheme.
4. University of California
Berkeley
CS 161: Computer Security Course Notes
Fall 2020. Lecture 8: "Cryptographic Hash Functions
" page 2
explicitly states: "A major application of cryptographic hash functions is to verify file integrity." It details the exact process described in the explanation.