Redvers Hashing Algorithm. User Guide. RCHASH Version 2.3
|
|
- Donald Cameron
- 5 years ago
- Views:
Transcription
1 Redvers Consulting Ltd Redvers Hashing Algorithm User Guide RCHASH Version 2.3
2 Contents Preface... 3 Introduction... 4 Overview... 5 Installation... 6 Calling RCHASH... 7 Parameters... 7 COMMUNICATION-BLOCK... 7 MESSAGE-STRING... 8 Sample Program with a single Message String... 9 Sample Program with multiple Message Strings Appendix A - Feedback Messages Appendix B - References Index Redvers Consulting Ltd Page 2
3 Preface This document describes the installation and operation of the Redvers Hashing Algorithm. It is designed for use by Information Technology departments running COBOL applications who wish to authenticate information transmitted to/from external sources or as a means to one-way encryption. This User Guide can be found on the internet at: Copyright 2015 Redvers Consulting Ltd. Redvers Consulting Ltd Page 3
4 Introduction Redvers Hashing Algorithm - User Guide 2.3 The Redvers Hashing Algorithm calculates a hash total, sometimes referred to as a message digest, representing a condensed abstract of the input message string. The total is not only dependant on the accumulation of all bit settings throughout the message but also the position of each bit within the message string. When data is to be transferred from one location to another, a hash total can be calculated at each location and compared to prove message completeness and authenticity. The possibility that two different messages could produce the same hash total (a collision ) is very unlikely for longer totals (384 bits or 512 bits) very, very unlikely. Hash totals cannot be used as a substitute for data encryption and decryption (see the Redvers Encryption Device [1] for details) as information is lost during the hashing process and therefore the output cannot be used to regenerate the original data. The Redvers Hashing Algorithm supports a total of nine Secure Hash Standard algorithms within the three algorithm groups: SHA-1, SHA-2 and SHA-3. SHA-1 produces a hash total length of 160 bits (20 bytes), with SHA-2 and SHA-3 each producing hash lengths of 224, 256, 384 or 512 bits (28, 32, 48 or 64 bytes respectively). In addition to the nine standard algorithms, truncated versions of SHA-512 (SHA- 512/224 and SHA-512/256) can also be generated. Definitions for the SHA-1 and SHA-2 algorithms can be found in the National Institute of Standards and Technology (NIST) [2] document FIPS PUB [3]. The current definitions for the SHA-3 algorithms can be found in the Keccak Reference [6] document. Redvers Consulting Ltd Page 4
5 Overview Redvers Hashing Algorithm - User Guide 2.3 The Redvers Hashing Algorithm is a COBOL subroutine (RCHASH) which may be called by applications running on any computer platform, in batch or on-line modes. Data to be hashed is passed to RCHASH in the form of a character string held in application storage. RCHASH then returns the binary hash total (message digest). Parameter information including the specific algorithm to be used, is transferred in a fixed format communication block. Data selected for hashing can consist of a single field, a record or a complete file of records, each passed to the subroutine in a CALL statement. Data Network Message sent Message received Application program RCHASH Message confirmed Application program RCHASH Redvers Consulting Ltd Page 5
6 Installation Redvers Hashing Algorithm - User Guide 2.3 The Redvers Hashing Algorithm (RCHASH) is a self-contained COBOL source program that requires no copybooks or objects. Before being despatched, the source code was passed through the Redvers COBOL Cloaking Device [4] which removes intellectual property within the source code without changing the logic. To install the program, copy the cloaked source code into your source code library and paste the activation key (sent in an when ordering/downloading) over the question marks in the last VALUE clause in WORKING-STORAGE. The program can then be compiled and linked using your standard COBOL compiler. If your site uses single quotes (apostrophes) rather than double quotes (speech marks) to delimit alphanumeric literals, a global change of all double quotes to single quotes can be made before compilation. CALL statements to RCHASH can now be added to applications as required. Details on how to call RCHASH can be found in the Calling RCHASH section of this guide. A sample calling program (RCHACALL) is also included in the downloaded trial package. If you should encounter any problems during installation, please contact your account manager or use our Contact facility at: Note: Free trial versions of RCHASH have the following limitations: It expires after 30 days; It cannot be called more than 100 times in a single execution. Redvers Consulting Ltd Page 6
7 Calling RCHASH Parameters Redvers Hashing Algorithm - User Guide 2.3 A call to RCHASH requires two parameters in the following sequence: COMMUNICATION-BLOCK This group level field contains the following fixed length sub-parameter fields: Field Picture Input/ output Use ALGORITHM PIC 9(04) Input Hash algorithm to be used: 0001 = SHA = SHA bit 0256 = SHA bit 0384 = SHA bit 0512 = SHA bit 2224 = SHA-512/ bit 2256 = SHA-512/ bit 3224 = SHA bit 3256 = SHA bit 3384 = SHA bit 3512 = SHA bit 9999 = Repeat previous algorithm using additional message data. STRING-LENGTH PIC S9(8) COMP Input The length of message data to be hashed (stored in MESSAGE-STRING). HASH-BIN PIC X(128) Output Field that will contain the binary hash total after successful completion. The length of the hash total will depend on the algorithm chosen: 0001 = 20 bytes 0224 = 28 bytes 0256 = 32 bytes 0384 = 48 bytes 0512 = 64 bytes 2224 = 28 bytes 2256 = 32 bytes 3224 = 28 bytes 3256 = 32 bytes Redvers Consulting Ltd Page 7
8 3384 = 48 bytes 3512 = 64 bytes (Left justified). HASH-HEX PIC X(256) Output Field that will contain the same hash total as HASH-BIN, in hexadecimal format. (Left justified). HASH-B64 PIC X(172) Output Field that will contain the same hash total as HASH-BIN, in Base64 [5] format. (Left justified). FEEDBACK-CODE PIC S9(4) COMP Output Feedback message number indicating a successful (zero) or unsuccessful (not zero) call to RCHASH. See Feedback Messages for a full list of feedback codes and texts. FEEDBACK-TEXT PIC X(80) Output Message text relating to the FEEDBACK-CODE. See Feedback Messages for a full list of feedback codes and texts. MESSAGE-STRING This is the storage area containing the input message data to be hash totalled (left justified). It may be a group or elementary data item of any size supported by the site compiler. If a series of message strings are to be hashed (a sequential file of records for example), producing one hash total for the entire series/file, the ALGORITHM parameter must be set to 9999 for all calls after the first MESSAGE-STRING. Note: The parameter names used in this guide are suggestions only and may be changed to names more suitable to the application making the call. Redvers Consulting Ltd Page 8
9 Sample Program with a single Message String... WORKING-STORAGE SECTION. 01 CB-COMMUNICATION-BLOCK. 03 CB-ALGORITHM PIC 9(04). 88 CB-SHA-1 VALUE CB-SHA-224 VALUE CB-SHA-256 VALUE CB-SHA-384 VALUE CB-SHA-512 VALUE CB-SHA VALUE CB-SHA VALUE CB-SHA VALUE CB-SHA VALUE CB-SHA VALUE CB-SHA VALUE CB-REPEAT-SHA VALUE CB-STRING-LENGTH PIC S9(8) COMP. 03 CB-HASH-BIN PIC X(128). 03 CB-HASH-HEX PIC X(256). 03 CB-HASH-B64 PIC X(172). 03 CB-FEEDBACK-CODE PIC S9(4) COMP. 03 CB-FEEDBACK-TEXT PIC X(80). 01 MESSAGE-STRING PIC X(800). PROCEDURE DIVISION. TOP-LEVEL SECTION. ****************************************************************** * This section populates the calling parameter fields and * * message area before making the call to RCHASH. * ****************************************************************** TOP-ENTER. INITIALIZE SET CB-SHA-256 CB-COMMUNICATION-BLOCK. TO TRUE. MOVE 44 TO CB-STRING-LENGTH. MOVE "THE QUICK BROWN FOX JUMPS OVER THE LAZY DOG." TO MESSAGE-STRING. PERFORM A-CALL-RCHASH. * Send CB-HASH-BIN, CB-HASH-HEX or CB-HASH-B64 for reconciliation. STOP RUN. TOP-EXIT. EXIT. A-CALL-RCHASH SECTION. ****************************************************************** * This section makes the call to RCHASH checking the * * FEEDBACK-CODE for any problems. * ****************************************************************** Redvers Consulting Ltd Page 9
10 A-ENTER. CALL "RCHASH" USING CB-COMMUNICATION-BLOCK MESSAGE-STRING. IF CB-FEEDBACK-CODE = ZERO DISPLAY CB-FEEDBACK-TEXT ELSE DISPLAY "BAD RETURN FROM RCHASH - FEEDBACK CODE IS " CB-FEEDBACK-CODE DISPLAY CB-FEEDBACK-TEXT STOP RUN END-IF. A-EXIT. EXIT. Sample Program with multiple Message Strings... FD IN-FILE LABEL RECORDS STANDARD. 01 IN-RECORD PIC X(100).... WORKING-STORAGE SECTION. 01 CB-COMMUNICATION-BLOCK. 03 CB-ALGORITHM PIC 9(04). 88 CB-SHA-1 VALUE CB-SHA-224 VALUE CB-SHA-256 VALUE CB-SHA-384 VALUE CB-SHA-512 VALUE CB-SHA VALUE CB-SHA VALUE CB-SHA VALUE CB-SHA VALUE CB-SHA VALUE CB-SHA VALUE CB-REPEAT-SHA VALUE CB-STRING-LENGTH PIC S9(8) COMP. 03 CB-HASH-BIN PIC X(128). 03 CB-HASH-HEX PIC X(256). 03 CB-HASH-B64 PIC X(172). 03 CB-FEEDBACK-CODE PIC S9(4) COMP. 03 CB-FEEDBACK-TEXT PIC X(80). 01 WS-IN-FLAG PIC X VALUE SPACE. 88 END-OF-IN-FILE VALUE E. Redvers Consulting Ltd Page 10
11 PROCEDURE DIVISION. TOP-LEVEL SECTION. ****************************************************************** * This section populates the calling parameter fields, opens * * the input file and performs a call to RCHASH for each record * * on the input file. * ****************************************************************** TOP-ENTER. INITIALIZE SET CB-SHA-512 MOVE 100 OPEN INPUT IN-FILE. READ IN-FILE AT END SET END-OF-IN-FILE CB-COMMUNICATION-BLOCK. TO TRUE. TO CB-STRING-LENGTH. TO TRUE. PERFORM UNTIL END-OF-IN-FILE PERFORM A-CALL-RCHASH SET CB-REPEAT-SHA TO TRUE READ IN-FILE AT END SET END-OF-IN-FILE TO TRUE END-PERFORM. * Send CB-HASH-BIN, CB-HASH-HEX or CB-HASH-B64 for reconciliation. CLOSE IN-FILE. STOP RUN. TOP-EXIT. EXIT. A-CALL-RCHASH SECTION. ****************************************************************** * This section makes the call to RCHASH checking the * * FEEDBACK-CODE for any problems. * ****************************************************************** A-ENTER. CALL "RCHASH" USING CB-COMMUNICATION-BLOCK IN-RECORD. IF CB-FEEDBACK-CODE = ZERO DISPLAY CB-FEEDBACK-TEXT ELSE DISPLAY "BAD RETURN FROM RCHASH - FEEDBACK CODE IS " CB-FEEDBACK-CODE DISPLAY CB-FEEDBACK-TEXT STOP RUN END-IF. A-EXIT. EXIT. Redvers Consulting Ltd Page 11
12 Appendix A - Feedback Messages Zero Feedback code from RCHASH: SHA-9999 HASH TOTAL COMPUTED FORZZ,ZZZ,ZZ9 DATA BYTES. Error Feedback codes from RCHASH: Feedbk Code Feedback Text Reason 0103 PROCESSING EXCEPTION. PLEASE CONTACT REDVERS CONSULTING BINARY STORAGE REALIGNMENT REQUIRED. PLEASE CONTACT REDVERS CONSULTING INVALID ALGORITHM PARAMETER. An unexpected logical error has occurred. Please contact your account manager or use our Contact facility at: The compiled RCHASH object code has produced some non-standard binary field lengths. This may occur when compiler options are set to special installation requirements. Please ask your account manager to provide a binary realigned version of RCHASH or use our Contact facility at: RCHASH currently supports the SHA-1, SHA-2 and SHA-3 algorithm types. For SHA-2 and SHA-3, four hash total lengths are available: 224 bit, 256 bit, 384 bit or 512 bit. For the first call to RCHASH, the ALGORITHM parameter must be set as follows: 0001 for SHA-1, 0224 for SHA bit, 0256 for SHA bit, 0384 for SHA bit, 0512 for SHA bit, 2224 for SHA-512/224 (truncated), 2256 for SHA-512/256 (truncated), 3224 for SHA bit, 3256 for SHA bit, 3384 for SHA bit, 3512 for SHA bit. Subsequent calls may use the 9999 ALGORITHM setting to repeat the previous algorithm using additional data held in MESSAGE-STRING. Redvers Consulting Ltd Page 12
13 0180 INVALID ACTIVATION KEY. PLEASE PLACE YOUR ACTIVATION KEY IN THE LAST W.S. FIELD DAY TRIAL PERIOD EXPIRED OR CALL LIMIT REACHED When the Redvers Hashing Algorithm was ordered or downloaded, a 32 byte activation key should have been sent from Redvers Consulting to the ordering or downloading customer. This key should be copied into the VALUE literal of the last field coded in the WORKING-STORAGE SECTION. The program must then be compiled and linked into the calling application. Additional activation keys may be requested from your account manager or using our Contact facility at: The Redvers Hashing Algorithm can be downloaded or ordered on a free 30 day trial basis. Either the thirty days have now elapsed or the limit of 100 calls in a continuous execution has been reached. To purchase a fully functional perpetual product licence or to request an additional thirty day trial please contact your Redvers Consulting account manager or use our Contact facility at: Redvers Consulting Ltd Page 13
14 Appendix B - References [1] Redvers Encryption Device: [2] National Institute of Standards and Technology (NIST): [3] Federal Information Processing Standards Publication 180-4: [4] Redvers COBOL Cloaking Device: [5] Base64 from Wikipedia, the free encyclopedia: [6] The Keccak Reference (SHA-3): Redvers Consulting Ltd Page 14
15 Index A account manager, 6, 12, 13 activation key, 6, 13 algorithm, 5, 12 ALGORITHM, 7 apostrophes, 6 B Base64, 8, 14 batch, 5 binary, 12 byte-storage mode, 12 C Calling, 7 Cloaking Device, 6, 14 COBOL, 3, 5, 6 collision, 4 COMMUNICATION-BLOCK, 7 compile, 6 Contact, 6, 12, 13 copybooks, 6 D double quotes, 6 E Encryption Device, 14 F Feedback Messages, 12 FEEDBACK-CODE, 8 FEEDBACK-TEXT, 8 FIPS PUB 180-4, 4 H HASH-B64, 8 HASH-BIN, 7 HASH-HEX, 8 I intellectual property, 6 K Keccak Reference, 4, 14 L literals, 6 logical error, 12 M message, 7 message digest, 4, 5 MESSAGE-STRING, 7, 8 N NIST, 4, 14 O objects, 6 on-line, 5 P Parameters, 7 R RCHASH, 5, 6 References, 14 Redvers Consulting Ltd Page 15
16 S Sample Program, 9, 10 SHA-1, 4, 7, 12 SHA-2, 4, 7, 12 SHA-3, 4, 7, 12 single quotes, 6 source code, 6 speech marks, 6 STRING-LENGTH, 7, 8 sub-parameter, 7 T trial, 13 Redvers Consulting Ltd Page 16
17 Redvers Consulting Ltd 44 Broadway, London E15 1XH, UK
Redvers COBOL XML Interface. User Guide. CICS Generator RCCICXML Version 2.4
Redvers Consulting Limited Redvers COBOL XML Interface User Guide CICS Generator RCCICXML Version 2.4 s Preface... 5 Overview... 6 Installation... 7 Coding the COBOL Record Definition... 9 Field Names...
More informationCOMPUTER EDUCATION TECHNIQUES, INC. (COBOL_QUIZ- 4.8) SA:
In order to learn which questions have been answered correctly: 1. Print these pages. 2. Answer the questions. 3. Send this assessment with the answers via: a. FAX to (212) 967-3498. Or b. Mail the answers
More informationAPPENDIX E SOLUTION TO CHAPTER SELF-TEST CHAPTER 1 TRUE-FALSE FILL-IN-THE-BLANKS
APPENDIX E SOLUTION TO CHAPTER SELF-TEST CHAPTER 1 2. F The AS/400 family of computers, as with all IBM midrange and mainframe computers, uses the EBCDIC coding system. 3. F Arrival sequence files do not
More informationTABLE 1 HANDLING. Chapter SYS-ED/ COMPUTER EDUCATION TECHNIQUES, INC.
TABLE 1 HANDLING Chapter SYS-ED/ COMPUTER EDUCATION TECHNIQUES, INC Objectives You will learn: C C C C C C When to use a table How to allocate and initialize a table Differences between a subscripted and
More informationUsing the PowerExchange CallProg Function to Call a User Exit Program
Using the PowerExchange CallProg Function to Call a User Exit Program 2010 Informatica Abstract This article describes how to use the PowerExchange CallProg function in an expression in a data map record
More informationHow to Setup MTO/JCL Spooler Housekeeping Facility for Enterprise Server
How to Setup MTO/JCL Spooler Housekeeping Facility for Enterprise Server Overview You can configure your enterprise server so when your region starts a CICS transaction called JCL1 runs automatically to
More informationNetwork and System Security
Network and System Security Lecture 5 2/12/2013 Hashes and Message Digests Mohammad Almalag 1 Overview 1. What is a cryptographic hash? 2. How are hashes used? 3. One-Way Functions 4. Birthday Problem
More informationCOBOL MOCK TEST COBOL MOCK TEST III
http://www.tutorialspoint.com COBOL MOCK TEST Copyright tutorialspoint.com This section presents you various set of Mock Tests related to COBOL Framework. You can download these sample mock tests at your
More informationCreating a procedural computer program using COBOL Level 2 Notes for City & Guilds 7540 Unit 005
Creating a procedural computer program using COBOL Level 2 Notes for City & Guilds 7540 Unit 005 Compatible with Micro Focus Net Express 5.0 COBOL compiler Version 1 Tench Computing Ltd Pines Glendale
More informationCS 645 : Lecture 6 Hashes, HMAC, and Authentication. Rachel Greenstadt May 16, 2012
CS 645 : Lecture 6 Hashes, HMAC, and Authentication Rachel Greenstadt May 16, 2012 Reminders Graded midterm, available on bbvista Project 3 out (crypto) Hash Functions MAC HMAC Authenticating SSL Man-in-the-middle
More informationEvolution of Sha-176 Algorithm
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 2, Issue 2 (July-Aug. 2012), PP 18-22 Evolution of Sha-176 Algorithm Piyush Garg 1, Namita Tiwari 2 1,2 (Computer Science and Engineering,
More informationIntroduction. Chapter 1:
Introduction Chapter 1: SYS-ED/Computer Education Techniques, Inc. Ch 1: 1 SYS-ED/Computer Education Techniques, Inc. 1:1 Objectives You will learn: New features of. Interface to COBOL and JAVA. Object-oriented
More information4 bits Microcontroller
EM MICROELECTRONIC - MARIN SA Question & answer 4 bits Microcontroller Questions and s Copyright 2001, EM Microelectronic-Marin SA 1 www.emmicroelectronic.com 1 Q: Is there an instruction to rotate left
More informationEthereum: 30 Tips & Tricks
FREE SAMPLE MICHAL ZALECKI.COM Ethereum: 30 Tips & Tricks FOR SOLIDITY DEVELOPERS MICHAŁ by Michał ZAŁĘCKI Załęcki X TOOPLOOX MICHAŁ ZAŁĘCKI Table of Contents TABLE OF CONTENTS CONTENTS#CON TABLE OF CONTENTS
More informationEncryption. INST 346, Section 0201 April 3, 2018
Encryption INST 346, Section 0201 April 3, 2018 Goals for Today Symmetric Key Encryption Public Key Encryption Certificate Authorities Secure Sockets Layer Simple encryption scheme substitution cipher:
More informationPositive Pay Export BR-1004
Positive Pay Export BR-1004 Overview This Extended Solution to the Bank Reconciliation module creates a Positive Pay format export file from B/R Entries in a variety of different formats. We do not warrant
More informationSpongeShaker. Release 1.1
SpongeShaker Release 1.1 November 22, 2014 Contents 1 spongeshaker API 3 1.1 spongeshaker.sha3 - SHA-3 proposal............................... 3 1.2 spongeshaker.hashing - Sponge as hash.............................
More informationPROGRAM-ID. BILLING. AUTHOR. GEORGE FOWLER-ED CHRISTENSON. INSTALLATION. TEXAS A & M UNIVERSITY-CSUS. DATE-WRITTEN.
* WHEN KEYING A COBOL PROGRAM, THERE ARE TWO MARGINS THAT * * REQUIRE CONSIDERATION. THE 'A' MARGIN (COLUMNS 8 TO 11) AND * * THE 'B' MARGIN (COLUMNS 12 TO 72). ALL DIVISION NAMES, * * SECTION NAMES, PARAGRAPH
More informationIS-Dev Kit-7 & 7D User s Manual
IS-Dev Kit-7 (ISC15ANP4) IS-Dev Kit-7 & 7D User s Manual Revision A Firmware Version 2.4 IS-Dev Kit-7D (ISC01P) NKK SWITCHES 7850 E. Gelding Drive Scottsdale, AZ 85260 Toll Free 1-877-2BUYNKK (877-228-9655)
More informationRef:
Cryptography & digital signature Dec. 2013 Ref: http://cis.poly.edu/~ross/ 2 Cryptography Overview Symmetric Key Cryptography Public Key Cryptography Message integrity and digital signatures References:
More informationDigital signatures: How it s done in PDF
Digital signatures: How it s done in PDF Agenda Why do we need digital signatures? Basic concepts applied to PDF Digital signatures and document workflow Long term validation Why do we need digital signatures?
More informationCGI Subroutines User's Guide
FUJITSU Software NetCOBOL V11.0 CGI Subroutines User's Guide Windows B1WD-3361-01ENZ0(00) August 2015 Preface Purpose of this manual This manual describes how to create, execute, and debug COBOL programs
More informationX/Open CAE Specification
X/Open CAE Specification X/Open Company, Ltd. December 1991, X/Open Company Limited All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in
More informationCopyright Network Management Forum
SPIRIT Platform Blueprint SPIRIT COBOL Language Portability Guide (SPIRIT Issue 3.0) Network Management Forum Copyright December 1995, Network Management Forum All rights reserved. No part of this publication
More informationCategory: Informational September 2004
Network Working Group R. Housley Request for Comments: 3874 Vigil Security Category: Informational September 2004 Status of this Memo A 224-bit One-way Hash Function: SHA-224 This memo provides information
More informationType of Cobol Entries
Review of COBOL Coding Rules: Columns Use Explanation 1-6 sequence numbers or page and line numbers (optional) 7 Continuation, Comment, or starting a new page Previously used for sequencechecking when
More informationCryptography and Network Security. Sixth Edition by William Stallings
Cryptography and Network Security Sixth Edition by William Stallings Chapter 13 Digital Signatures To guard against the baneful influence exerted by strangers is therefore an elementary dictate of savage
More informationCOBOL Unbounded Loops A Diatribe On Their Omission From the COBOL Standard (and a Plea for Understanding)
COBOL Unbounded Loops A Diatribe On Their Omission From the COBOL Standard (and a Plea for Understanding) August 11, 2016 Frank Swarbrick Principal Analyst Mainframe Applications Development FirstBank
More informationIS-Dev Kit-8 User Manual
IS-Dev Kit-8 User Manual Revision A IS-Dev Kit-8 Version 1.0 NKK SWITCHES 7850 E. Gelding Drive Scottsdale, AZ 85260 Toll Free 1-877-2BUYNKK (877-228-9655) Phone 480-991-0942 Fax 480-998-1435 e-mail
More informationDL/1. - Application programs are independent from the physical storage and access method.
DL/1 OVERVIEW The historical approach to data processing was to have individual files dedicated to each application. This led to considerable data duplication, and therefore wasted space and additional
More informationChapter 7: Statement Generator
Chapter 7: Statement Generator CHAPTER 7: STATEMENT GENERATOR... 1 STATEMENT GENERATOR OVERVIEW... 1 PARAMETER FORMATS... 2 CONTROL (TYPE 3 PARAMETER)... 2 Type 3 Parameter Fields... 2 ADDITIONAL GROUPS
More informationWinter 2011 Josh Benaloh Brian LaMacchia
Winter 2011 Josh Benaloh Brian LaMacchia Symmetric Cryptography January 20, 2011 Practical Aspects of Modern Cryptography 2 Agenda Symmetric key ciphers Stream ciphers Block ciphers Cryptographic hash
More informationHow to store external documents in your Vision files
Have you ever given any thought to the possibility of storing external documents in a Vision file? Documents are data, and the Vision files are done for storing data, right? Isn t it obvious? But what
More informationChapter 2 INTERNAL SORTS. SYS-ED/ Computer Education Techniques, Inc.
Chapter 2 INTERNAL SORTS SYS-ED/ Computer Education Techniques, Inc Objectives You will learn: Sorting - role and purpose Advantages and tradeoffs associated with an internal and external sort How to code
More informationSHA Core, Xilinx Edition. Core Facts
SHA Core, Xilinx Edition May 3, 2017 Product Specification Algotronix 130-10 Calton Road Edinburgh, Scotland United Kingdom, EH8 8JQ Phone: +44 131 556 9242 E-mail: cores@algotronix.com URL: www.algotronix.com
More informationborzoi Manual Dragongate Technologies Ltd.
borzoi Manual Dragongate Technologies Ltd. September 21, 2003 Contents 1 Introduction 1 2 Preliminaries 2 2.1 Header Files............................ 2 2.2 Type Definitions......................... 2
More informationIS-Dev Kit-8 User Manual
IS-Dev Kit-8 User Manual Revision E Version 3.0 IS18WWC1W Development Kit. NKK SWITCHES 7850 E. Gelding Drive Scottsdale, AZ 85260 Toll Free 1-877-2BUYNKK (877-228-9655) Phone 480-991-0942 Fax 480-998-1435
More informationKurose & Ross, Chapters (5 th ed.)
Kurose & Ross, Chapters 8.2-8.3 (5 th ed.) Slides adapted from: J. Kurose & K. Ross \ Computer Networking: A Top Down Approach (5 th ed.) Addison-Wesley, April 2009. Copyright 1996-2010, J.F Kurose and
More informationIntegrity of messages
Lecturers: Mark D. Ryan and David Galindo. Cryptography 2016. Slide: 106 Integrity of messages Goal: Ensure change of message by attacker can be detected Key tool: Cryptographic hash function Definition
More informationTransforming Legacy Code: The Pitfalls of Automation
Transforming Legacy Code: The Pitfalls of Automation By William Calcagni and Robert Camacho www.languageportability.com 866.731.9977 Code Transformation Once the decision has been made to undertake an
More informationIS-DEV KIT-9 User Manual
IS-DEV KIT-9 User Manual Revision C Firmware Version 1.0 NKK SWITCHES 7850 E. Gelding Drive Scottsdale, AZ 85260 Toll Free 1-877-2BUYNKK (877-228-9655) Phone 480-991-0942 Fax 480-998-1435 e-mail
More informationMarshallSoft AES. (Advanced Encryption Standard) Library for Delphi. Programmer's Manual
MarshallSoft AES (Advanced Encryption Standard) Library for Delphi Programmer's Manual (AES4D) Version 4.1 June 26, 2017 This software is provided as-is. There are no warranties, expressed or implied.
More informationChapter. Storeroom Module. Table of Contents
Chapter 16 Module The module is used to record and track inventory and storeroom information. This Chapter describes how to use the Web Work module. Table of Contents 16.1 OVERVIEW OF THE STOREROOM MODULE...
More informationMicro Focus RM/COBOL. RM/COBOL Syntax Summary
Micro Focus RM/COBOL RM/COBOL Syntax Summary Contents Micro Focus The Lawn 22-30 Old Bath Road Newbury, Berkshire RG14 1QN UK http://www.microfocus.com Copyright Micro Focus 2017. All rights reserved.
More informationSection 1. The essence of COBOL programming. Mike Murach & Associates
Chapter 1 Introduction to COBOL programming 1 Section 1 The essence of COBOL programming The best way to learn COBOL programming is to start doing it, and that s the approach the chapters in this section
More informationOverview. CSC 580 Cryptography and Computer Security. Hash Function Basics and Terminology. March 28, Cryptographic Hash Functions (Chapter 11)
CSC 580 Cryptography and Computer Security Cryptographic Hash Functions (Chapter 11) March 28, 2017 Overview Today: Review Homework 8 solutions Discuss cryptographic hash functions Next: Study for quiz
More informationHashing (Message Digest)
Hashing (Message Digest) Hashing (Message Digest) Hashing (Message Digest) Hello There Hashing (Message Digest) What not Hash Function One way Needed properties for cryptographically secure hash: 1 Computationally
More informationIntroduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms
Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of
More informationCryptographic Hash Functions. William R. Speirs
Cryptographic Hash Functions William R. Speirs What is a hash function? Compression: A function that maps arbitrarily long binary strings to fixed length binary strings Ease of Computation: Given a hash
More informationMarshallSoft AES. (Advanced Encryption Standard) Reference Manual
MarshallSoft AES (Advanced Encryption Standard) Reference Manual (AES_REF) Version 4.1 June 23, 2017 This software is provided as-is. There are no warranties, expressed or implied. Copyright (C) 2017 All
More informationח'/סיון/תשע "א. RSA: getting ready. Public Key Cryptography. Public key cryptography. Public key encryption algorithms
Public Key Cryptography Kurose & Ross, Chapters 8.28.3 (5 th ed.) Slides adapted from: J. Kurose & K. Ross \ Computer Networking: A Top Down Approach (5 th ed.) AddisonWesley, April 2009. Copyright 19962010,
More informationUnicode Support. Chapter 2:
Unicode Support Chapter 2: SYS-ED/Computer Education Techniques, Inc. Ch 2: 1 SYS-ED/Computer Education Techniques, Inc. Ch 2: 1 Objectives You will learn: Unicode features. How to use literals and data
More informationGnuCOBOL Quick Reference
GnuCOBOL Quick Reference For Version 2.2 Final [7Sept2017] Gary L. Cutler (cutlergl@gmail.com). For updates Vincent B. Coen (vbcoen@gmail.com). This manual documents GnuCOBOL 2.2 Final, 7Sept2017 build.
More informationTIBCO ActiveMatrix BusinessWorks Plug-in for Data Conversion Release Notes
TIBCO ActiveMatrix BusinessWorks Plug-in for Data Conversion Release Notes Software Release 4.2.0 November 2014 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER
More informationHAI Network Communication Protocol Description
Home Automation, Inc. HAI Network Communication Protocol Description This document contains the intellectual property of Home Automation, Inc. (HAI). HAI authorizes the use of this information for the
More informationRM/COBOL to RM/COBOL-85
Liant Software Corporation RM/COBOL to RM/COBOL-85 Conversion Guide Copyright 1989 2003. Liant Software Corporation. All rights reserved. No part of this publication may be reproduced, stored in a retrieval
More informationCSC 580 Cryptography and Computer Security
CSC 580 Cryptography and Computer Security Cryptographic Hash Functions (Chapter 11) March 22 and 27, 2018 Overview Today: Quiz (based on HW 6) Graded HW 2 due Grad/honors students: Project topic selection
More informationCA Calendar Routines. Technical Manual
CA Calendar Routines Technical Manual r6 This documentation (the Documentation ) and related computer software program (the Software ) (hereinafter collectively referred to as the Product ) is for the
More informationNetwork Working Group Request for Comments: 4432 March 2006 Category: Standards Track
Network Working Group B. Harris Request for Comments: 4432 March 2006 Category: Standards Track Status of This Memo RSA Key Exchange for the Secure Shell (SSH) Transport Layer Protocol This document specifies
More informationTrack down your CICS program bugs with TRACK
Track down your CICS program bugs with TRACK 1 TRACK provides on-line testing and debugging capabilities in CICS environments. It increases CICS reliability and improves productivity by enabling application
More informationKeccak. Final Paper. Team Bletchley. Chris Bentivenga Frederick Christie Michael Kitson
Keccak Final Paper Team Bletchley Chris Bentivenga Frederick Christie Michael Kitson Description of the Algorithm Keccak is the winner of NIST hash function competition, and is the accepted standard for
More informationImplementation of the AES as a Hash Function for Confirming the Identity of Software on a Computer System
PNNL-1417 Implementation of the AES as a Hash Function for Confirming the Identity of Software on a Computer System R.R. Hansen R.. ass R.T. Kouzes N.D. Mileson January 23 Prepared for the U.S. Department
More informationEXgarde. EXvisitors. User Manual. UM0001.GB Issue 2 11/06/2015. TDSi Unit 10 Concept Park Innovation Close Poole Dorset BH12 4QT, UK
EXgarde EXvisitors User Manual UM0001.GB Issue 2 11/06/2015 www.tdsi.co.uk TDSi Unit 10 Concept Park Innovation Close Poole Dorset BH12 4QT, UK Tel: +44 (0) 1202 723535 Fax: +44 (0) 1202 724975 Sales Enquiries:
More informationFIPS Non-Proprietary Security Policy
Quantum Corporation Scalar Key Manager Software Version 2.0.1 FIPS 140-2 Non-Proprietary Security Policy Document Version 1.4 Last Update: 2010-11-03 8:43:00 AM 2010 Quantum Corporation. May be freely
More informationSMS Outbound. SMTP interface - v1.1
SMS Outbound SMTP interface - v1.1 Table of contents 1. Version history... 5 2. Conventions... 5 3. Introduction... 6 4. Gateway connection... 7 4.1 E-mail message format... 7 4.2 Header section... 7 4.3
More informationComputer Associates SRAM Sort Emulation
Batch Mainframe applications in COBOL or PL/1 may use CA s SRAM sort on the mainframe. Mainframe Express does not support SRAM by default. SRAM sort is compatible to DFSORT (only the process of invocation
More informationEncryption I. An Introduction
Encryption I An Introduction Reading List ADO and SQL Server Security A Simple Guide to Cryptography Protecting Private Data with the Cryptography Namespaces Using MD5 to Encrypt Passwords in a Database
More informationChapter 8 Web Security
Chapter 8 Web Security Web security includes three parts: security of server, security of client, and network traffic security between a browser and a server. Security of server and security of client
More informationCOBOL for AIX. Source conversion utility (scu)
COBOL for AIX Source conversion utility (scu) COBOL for AIX Source conversion utility (scu) ii Source conversion utility (scu) Contents Source conversion utility (scu)..... 1 Source conversion utility
More informationPlaintext-Recovery Attacks Against Datagram TLS
Information Security Group Royal Holloway, University of London 6th Feb 2012 Contents 1 Results 2 3 4 Padding Oracle Realisation Against OpenSSL 5 Attacking the GnuTLS Implementation of DTLS 6 Results
More informationAbout these Release Notes. This document contains important information about Pro*COBOL 12c Release 2 (12.2).
Pro*COBOL Release Notes 12c Release 2 (12.2) E85817-01 May 2017 Release Notes About these Release Notes This document contains important information about Pro*COBOL 12c Release 2 (12.2). It contains the
More informationMessage authentication codes
Message authentication codes Martin Stanek Department of Computer Science Comenius University stanek@dcs.fmph.uniba.sk Cryptology 1 (2017/18) Content Introduction security of MAC Constructions block cipher
More informationS. Erfani, ECE Dept., University of Windsor Network Security. All hash functions operate using the following general principles:
4.14 Simple Hash Functions All hash functions operate using the following general principles: a) The input string is viewed as a sequence of n-byte blocks. b) The input is processed one block at a time
More informationCryptographic Hash Functions. Rocky K. C. Chang, February 5, 2015
Cryptographic Hash Functions Rocky K. C. Chang, February 5, 2015 1 This set of slides addresses 2 Outline Cryptographic hash functions Unkeyed and keyed hash functions Security of cryptographic hash functions
More informationMQ Authenticate User Security Exit for z/os Overview
MQ Authenticate User Security Exit for z/os Overview Capitalware Inc. Unit 11, 1673 Richmond Street, PMB524 London, Ontario N6G2N3 Canada sales@capitalware.com http://www.capitalware.com Table of Contents
More informationGechstudentszone.wordpress.com
CHAPTER -2 2.1 Basic Assembler Functions: The basic assembler functions are: ASSEMBLERS-1 Translating mnemonic language code to its equivalent object code. Assigning machine addresses to symbolic labels.
More informationConfiguring Secure Socket Layer HTTP
This feature provides Secure Socket Layer (SSL) version 3.0 support for the HTTP 1.1 server and HTTP 1.1 client within Cisco IOS software. SSL provides server authentication, encryption, and message integrity
More informationA comparative study of Message Digest 5(MD5) and SHA256 algorithm
Journal of Physics: Conference Series PAPER OPEN ACCESS A comparative study of Message Digest 5(MD5) and SHA256 algorithm To cite this article: D Rachmawati et al 208 J. Phys.: Conf. Ser. 978 026 View
More informationConfiguring Secure Socket Layer HTTP
This feature provides Secure Socket Layer (SSL) version 3.0 support for the HTTP 1.1 server and HTTP 1.1 client within Cisco IOS software. SSL provides server authentication, encryption, and message integrity
More informationISO Data Element Definitions
SECTION 4 ISO 8583 1987 DATA ELEMENT DEFINITIONS Overview...4-1 Bit Maps...4-2 Annotation Conventions For Data Element s...4-3 General Representation...4-3 Length s...4-4 Field Content s...4-5 Conventions
More informationZENworks 11 Support Pack 4 Endpoint Security Utilities Reference. October 2016
ZENworks 11 Support Pack 4 Endpoint Security Utilities Reference October 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S.
More information$DXM DBX Dictionary Maintenance Utility
1. Introduction The information about the structure of a DBX Speedbase database is stored in a DBX data dictionary. Before you can actually create your DBX database, or compile a program using a DBX database,
More informationComputer Networks. Wenzhong Li. Nanjing University
Computer Networks Wenzhong Li Nanjing University 1 Chapter 7. Network Security Network Attacks Cryptographic Technologies Message Integrity and Authentication Key Distribution Firewalls Transport Layer
More informationCA Culprit for CA IDMS
CA Culprit for CA IDMS User Modules Guide Release 18.5.00, 2nd Edition This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the
More informationConversion Between Number Bases
Conversion Between Number Bases MATH 100 Survey of Mathematical Ideas J. Robert Buchanan Department of Mathematics Summer 2018 General Number Bases Bases other than 10 are sometimes used in numeration
More informationMoving Data and Printing Information. The Move Statement has The following Format: Move Identifier-1 To Identifier-2. Move Literal-1 To Identifier-2
and Printing Information The Move Statement has The following Format: Format 1 Move Identifier-1 To Identifier-2 Format2 Move Literal-1 To Identifier-2 The Move Statement has the following components Sending
More informationNEVADA ELLIS COMPUTING SOFTWARE TECHNOLOGY
NEVADA ELLIS COMPUTING SOFTWARE TECHNOLOGY 12-15-82 NEVADA COBOL PAGE 1 NEVADA COBOL Programmers' Reference Manual Edition II for use with Rev 2.1 or higher diskettes Copyright (C) 1979,1981,1982 by Ellis
More informationHash Tables. Hashing Probing Separate Chaining Hash Function
Hash Tables Hashing Probing Separate Chaining Hash Function Introduction In Chapter 4 we saw: linear search O( n ) binary search O( log n ) Can we improve the search operation to achieve better than O(
More informationS. Erfani, ECE Dept., University of Windsor Network Security
4.11 Data Integrity and Authentication It was mentioned earlier in this chapter that integrity and protection security services are needed to protect against active attacks, such as falsification of data
More informationChapter 8 Security. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012
Chapter 8 Security A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations; and can add,
More informationNetwork Working Group Request for Comments: 2202 Category: Informational NIST September 1997
Network Working Group Request for Comments: 2202 Category: Informational P. Cheng IBM R. Glenn NIST September 1997 Status of This Memo Test Cases for HMAC-MD5 and HMAC-SHA-1 This memo provides information
More informationIf you want to download a simple program for added/refreshing line numbers, go to the Links page.
!! 1 1. Getting Started 1.1 Introduction The aim of the ZingCOBOL is to give the basics of the COBOL programming language for anyone who knows a little bit about computers (not much) and preferably will
More informationAlliance Key Manager A Solution Brief for Partners & Integrators
Alliance Key Manager A Solution Brief for Partners & Integrators Key Management Enterprise Encryption Key Management This paper is designed to help technical managers, product managers, and developers
More informationLecture 6: Symmetric Cryptography. CS 5430 February 21, 2018
Lecture 6: Symmetric Cryptography CS 5430 February 21, 2018 The Big Picture Thus Far Attacks are perpetrated by threats that inflict harm by exploiting vulnerabilities which are controlled by countermeasures.
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2 Objectives
More informationRevision History Revision 0 (T10/06-225r0): Posted to the T10 web site on 4 May 2006.
To: INCITS T10 Committee From: Matt Ball, Quantum Corporation Date: March 13, 2007 Subject: SSC-3: Key Entry using Encapsulating Security Payload (ESP) Revision History Revision 0 (T10/06-225r0): Posted
More informationCryptography. Summer Term 2010
Summer Term 2010 Chapter 2: Hash Functions Contents Definition and basic properties Basic design principles and SHA-1 The SHA-3 competition 2 Contents Definition and basic properties Basic design principles
More informationA hash function is strongly collision-free if it is computationally infeasible to find different messages M and M such that H(M) = H(M ).
CA4005: CRYPTOGRAPHY AND SECURITY PROTOCOLS 1 5 5.1 A hash function is an efficient function mapping binary strings of arbitrary length to binary strings of fixed length (e.g. 128 bits), called the hash-value
More informationSemi-free start collision attack on Blender
Semi-free start collision attack on Blender Xu Liangyu and Li Ji Sony China Research Laboratory {Liangyu.Xu, Ji.Li}@sony.com.cn Abstract. Blender is a cryptographic hash function submitted to NIST s SHA3
More informationItem A The first line contains basic information about the dump including its code, transaction identifier and dump identifier. The Symptom string
1 2 Item A The first line contains basic information about the dump including its code, transaction identifier and dump identifier. The Symptom string contains information which is normally used to perform
More information