The security of data is enhanced by the use of cyclic redundancy checks.
Data is encoded with one or more cyclic redundancy checks and then
transmitted by a transmitter to a receiver. The receiver receives the
encoded data and decodes it in order to use the one or more cyclic
redundancy checks to determine whether the data was sent by an authorized
user.