Siemens Industry Online Support
Siemens AG
Entry type: FAQ, Entry ID: 109483101, Entry date: 10/05/2016

How do you determine the SHA-256 checksum of a file?

  • Entry
  • Associated product(s)
To check the integrity of a file you can use mathematical procedures to create a checksum of the file. For example, you can use the md5deep tool to determine the checksum.

You have downloaded a file from Online Support and would like to check the integrity of the data. You know the SHA-256 checksum of the downloaded file.

You can determine the SHA-256 checksum of a file using different tools and programs. The principal procedure is described here using the "sha256deep" tool as an example. Information about the tool is on the project home page: http://md5deep.sourceforge.net/.

Download the tool from the project home page. Use the tool to generate the SHA-256 checksum for the file to be checked.

Compare the generated checksum with the expected checksum. If both checksums are the same, you can presume that the downloaded file is complete and uncorrupted. If the checksums are different, download the file again. After the download has been completed, verify the checksum again.

Table 01: Determine the SHA-256 checksum with the "md5deep" tool

1)Download the current version of the tool via GitHub and unpack the file in a directory on your computer.

Call the Windows command line. For this, in the Start menu you enter the command "cmd" in the input field and click Enter.

A new command line window opens.

In the command line window you enter the file name of the tool specifying the path in which the file is located.
For this you drag the "sha256deep.exe" file from the directory with the unpacked file and drop it into the command line window.
4)In the command line window you enter a space after the file name.

Specify the file name of the file to be verified along with the path in which the file is located. Drag and drop the file into the command line window.


Click Enter. The tool then calculates the sha256 hash of the file and outputs the hash code from the screen.


Copy the hash code just generated to the Windows clipboard.

- For this you right-click in the command line window to open the pop-up menu and select "Mark".
- Click the hash code to select it.

- Then right-click again. This copies the marked hash code to the clipboard.

With the key combination Ctrl + V you can insert the hash code into the text file and compare it.

Security information
In order to protect plants, systems, machines and networks against cyber threats, it is necessary to implement – and continuously maintain – a holistic, state-of-the-art industrial security concept. Siemens’ products and solutions constitute one element of such a concept. For more information about industrial security, please visit