Redvers Hashing Algorithm. User Guide. RCHASH Version 2.3

Size: px
Start display at page:

Download "Redvers Hashing Algorithm. User Guide. RCHASH Version 2.3"

Transcription

1 Redvers Consulting Ltd Redvers Hashing Algorithm User Guide RCHASH Version 2.3

2 Contents Preface... 3 Introduction... 4 Overview... 5 Installation... 6 Calling RCHASH... 7 Parameters... 7 COMMUNICATION-BLOCK... 7 MESSAGE-STRING... 8 Sample Program with a single Message String... 9 Sample Program with multiple Message Strings Appendix A - Feedback Messages Appendix B - References Index Redvers Consulting Ltd Page 2

3 Preface This document describes the installation and operation of the Redvers Hashing Algorithm. It is designed for use by Information Technology departments running COBOL applications who wish to authenticate information transmitted to/from external sources or as a means to one-way encryption. This User Guide can be found on the internet at: Copyright 2015 Redvers Consulting Ltd. Redvers Consulting Ltd Page 3

4 Introduction Redvers Hashing Algorithm - User Guide 2.3 The Redvers Hashing Algorithm calculates a hash total, sometimes referred to as a message digest, representing a condensed abstract of the input message string. The total is not only dependant on the accumulation of all bit settings throughout the message but also the position of each bit within the message string. When data is to be transferred from one location to another, a hash total can be calculated at each location and compared to prove message completeness and authenticity. The possibility that two different messages could produce the same hash total (a collision ) is very unlikely for longer totals (384 bits or 512 bits) very, very unlikely. Hash totals cannot be used as a substitute for data encryption and decryption (see the Redvers Encryption Device [1] for details) as information is lost during the hashing process and therefore the output cannot be used to regenerate the original data. The Redvers Hashing Algorithm supports a total of nine Secure Hash Standard algorithms within the three algorithm groups: SHA-1, SHA-2 and SHA-3. SHA-1 produces a hash total length of 160 bits (20 bytes), with SHA-2 and SHA-3 each producing hash lengths of 224, 256, 384 or 512 bits (28, 32, 48 or 64 bytes respectively). In addition to the nine standard algorithms, truncated versions of SHA-512 (SHA- 512/224 and SHA-512/256) can also be generated. Definitions for the SHA-1 and SHA-2 algorithms can be found in the National Institute of Standards and Technology (NIST) [2] document FIPS PUB [3]. The current definitions for the SHA-3 algorithms can be found in the Keccak Reference [6] document. Redvers Consulting Ltd Page 4

5 Overview Redvers Hashing Algorithm - User Guide 2.3 The Redvers Hashing Algorithm is a COBOL subroutine (RCHASH) which may be called by applications running on any computer platform, in batch or on-line modes. Data to be hashed is passed to RCHASH in the form of a character string held in application storage. RCHASH then returns the binary hash total (message digest). Parameter information including the specific algorithm to be used, is transferred in a fixed format communication block. Data selected for hashing can consist of a single field, a record or a complete file of records, each passed to the subroutine in a CALL statement. Data Network Message sent Message received Application program RCHASH Message confirmed Application program RCHASH Redvers Consulting Ltd Page 5

6 Installation Redvers Hashing Algorithm - User Guide 2.3 The Redvers Hashing Algorithm (RCHASH) is a self-contained COBOL source program that requires no copybooks or objects. Before being despatched, the source code was passed through the Redvers COBOL Cloaking Device [4] which removes intellectual property within the source code without changing the logic. To install the program, copy the cloaked source code into your source code library and paste the activation key (sent in an when ordering/downloading) over the question marks in the last VALUE clause in WORKING-STORAGE. The program can then be compiled and linked using your standard COBOL compiler. If your site uses single quotes (apostrophes) rather than double quotes (speech marks) to delimit alphanumeric literals, a global change of all double quotes to single quotes can be made before compilation. CALL statements to RCHASH can now be added to applications as required. Details on how to call RCHASH can be found in the Calling RCHASH section of this guide. A sample calling program (RCHACALL) is also included in the downloaded trial package. If you should encounter any problems during installation, please contact your account manager or use our Contact facility at: Note: Free trial versions of RCHASH have the following limitations: It expires after 30 days; It cannot be called more than 100 times in a single execution. Redvers Consulting Ltd Page 6

7 Calling RCHASH Parameters Redvers Hashing Algorithm - User Guide 2.3 A call to RCHASH requires two parameters in the following sequence: COMMUNICATION-BLOCK This group level field contains the following fixed length sub-parameter fields: Field Picture Input/ output Use ALGORITHM PIC 9(04) Input Hash algorithm to be used: 0001 = SHA = SHA bit 0256 = SHA bit 0384 = SHA bit 0512 = SHA bit 2224 = SHA-512/ bit 2256 = SHA-512/ bit 3224 = SHA bit 3256 = SHA bit 3384 = SHA bit 3512 = SHA bit 9999 = Repeat previous algorithm using additional message data. STRING-LENGTH PIC S9(8) COMP Input The length of message data to be hashed (stored in MESSAGE-STRING). HASH-BIN PIC X(128) Output Field that will contain the binary hash total after successful completion. The length of the hash total will depend on the algorithm chosen: 0001 = 20 bytes 0224 = 28 bytes 0256 = 32 bytes 0384 = 48 bytes 0512 = 64 bytes 2224 = 28 bytes 2256 = 32 bytes 3224 = 28 bytes 3256 = 32 bytes Redvers Consulting Ltd Page 7

8 3384 = 48 bytes 3512 = 64 bytes (Left justified). HASH-HEX PIC X(256) Output Field that will contain the same hash total as HASH-BIN, in hexadecimal format. (Left justified). HASH-B64 PIC X(172) Output Field that will contain the same hash total as HASH-BIN, in Base64 [5] format. (Left justified). FEEDBACK-CODE PIC S9(4) COMP Output Feedback message number indicating a successful (zero) or unsuccessful (not zero) call to RCHASH. See Feedback Messages for a full list of feedback codes and texts. FEEDBACK-TEXT PIC X(80) Output Message text relating to the FEEDBACK-CODE. See Feedback Messages for a full list of feedback codes and texts. MESSAGE-STRING This is the storage area containing the input message data to be hash totalled (left justified). It may be a group or elementary data item of any size supported by the site compiler. If a series of message strings are to be hashed (a sequential file of records for example), producing one hash total for the entire series/file, the ALGORITHM parameter must be set to 9999 for all calls after the first MESSAGE-STRING. Note: The parameter names used in this guide are suggestions only and may be changed to names more suitable to the application making the call. Redvers Consulting Ltd Page 8

9 Sample Program with a single Message String... WORKING-STORAGE SECTION. 01 CB-COMMUNICATION-BLOCK. 03 CB-ALGORITHM PIC 9(04). 88 CB-SHA-1 VALUE CB-SHA-224 VALUE CB-SHA-256 VALUE CB-SHA-384 VALUE CB-SHA-512 VALUE CB-SHA VALUE CB-SHA VALUE CB-SHA VALUE CB-SHA VALUE CB-SHA VALUE CB-SHA VALUE CB-REPEAT-SHA VALUE CB-STRING-LENGTH PIC S9(8) COMP. 03 CB-HASH-BIN PIC X(128). 03 CB-HASH-HEX PIC X(256). 03 CB-HASH-B64 PIC X(172). 03 CB-FEEDBACK-CODE PIC S9(4) COMP. 03 CB-FEEDBACK-TEXT PIC X(80). 01 MESSAGE-STRING PIC X(800). PROCEDURE DIVISION. TOP-LEVEL SECTION. ****************************************************************** * This section populates the calling parameter fields and * * message area before making the call to RCHASH. * ****************************************************************** TOP-ENTER. INITIALIZE SET CB-SHA-256 CB-COMMUNICATION-BLOCK. TO TRUE. MOVE 44 TO CB-STRING-LENGTH. MOVE "THE QUICK BROWN FOX JUMPS OVER THE LAZY DOG." TO MESSAGE-STRING. PERFORM A-CALL-RCHASH. * Send CB-HASH-BIN, CB-HASH-HEX or CB-HASH-B64 for reconciliation. STOP RUN. TOP-EXIT. EXIT. A-CALL-RCHASH SECTION. ****************************************************************** * This section makes the call to RCHASH checking the * * FEEDBACK-CODE for any problems. * ****************************************************************** Redvers Consulting Ltd Page 9

10 A-ENTER. CALL "RCHASH" USING CB-COMMUNICATION-BLOCK MESSAGE-STRING. IF CB-FEEDBACK-CODE = ZERO DISPLAY CB-FEEDBACK-TEXT ELSE DISPLAY "BAD RETURN FROM RCHASH - FEEDBACK CODE IS " CB-FEEDBACK-CODE DISPLAY CB-FEEDBACK-TEXT STOP RUN END-IF. A-EXIT. EXIT. Sample Program with multiple Message Strings... FD IN-FILE LABEL RECORDS STANDARD. 01 IN-RECORD PIC X(100).... WORKING-STORAGE SECTION. 01 CB-COMMUNICATION-BLOCK. 03 CB-ALGORITHM PIC 9(04). 88 CB-SHA-1 VALUE CB-SHA-224 VALUE CB-SHA-256 VALUE CB-SHA-384 VALUE CB-SHA-512 VALUE CB-SHA VALUE CB-SHA VALUE CB-SHA VALUE CB-SHA VALUE CB-SHA VALUE CB-SHA VALUE CB-REPEAT-SHA VALUE CB-STRING-LENGTH PIC S9(8) COMP. 03 CB-HASH-BIN PIC X(128). 03 CB-HASH-HEX PIC X(256). 03 CB-HASH-B64 PIC X(172). 03 CB-FEEDBACK-CODE PIC S9(4) COMP. 03 CB-FEEDBACK-TEXT PIC X(80). 01 WS-IN-FLAG PIC X VALUE SPACE. 88 END-OF-IN-FILE VALUE E. Redvers Consulting Ltd Page 10

11 PROCEDURE DIVISION. TOP-LEVEL SECTION. ****************************************************************** * This section populates the calling parameter fields, opens * * the input file and performs a call to RCHASH for each record * * on the input file. * ****************************************************************** TOP-ENTER. INITIALIZE SET CB-SHA-512 MOVE 100 OPEN INPUT IN-FILE. READ IN-FILE AT END SET END-OF-IN-FILE CB-COMMUNICATION-BLOCK. TO TRUE. TO CB-STRING-LENGTH. TO TRUE. PERFORM UNTIL END-OF-IN-FILE PERFORM A-CALL-RCHASH SET CB-REPEAT-SHA TO TRUE READ IN-FILE AT END SET END-OF-IN-FILE TO TRUE END-PERFORM. * Send CB-HASH-BIN, CB-HASH-HEX or CB-HASH-B64 for reconciliation. CLOSE IN-FILE. STOP RUN. TOP-EXIT. EXIT. A-CALL-RCHASH SECTION. ****************************************************************** * This section makes the call to RCHASH checking the * * FEEDBACK-CODE for any problems. * ****************************************************************** A-ENTER. CALL "RCHASH" USING CB-COMMUNICATION-BLOCK IN-RECORD. IF CB-FEEDBACK-CODE = ZERO DISPLAY CB-FEEDBACK-TEXT ELSE DISPLAY "BAD RETURN FROM RCHASH - FEEDBACK CODE IS " CB-FEEDBACK-CODE DISPLAY CB-FEEDBACK-TEXT STOP RUN END-IF. A-EXIT. EXIT. Redvers Consulting Ltd Page 11

12 Appendix A - Feedback Messages Zero Feedback code from RCHASH: SHA-9999 HASH TOTAL COMPUTED FORZZ,ZZZ,ZZ9 DATA BYTES. Error Feedback codes from RCHASH: Feedbk Code Feedback Text Reason 0103 PROCESSING EXCEPTION. PLEASE CONTACT REDVERS CONSULTING BINARY STORAGE REALIGNMENT REQUIRED. PLEASE CONTACT REDVERS CONSULTING INVALID ALGORITHM PARAMETER. An unexpected logical error has occurred. Please contact your account manager or use our Contact facility at: The compiled RCHASH object code has produced some non-standard binary field lengths. This may occur when compiler options are set to special installation requirements. Please ask your account manager to provide a binary realigned version of RCHASH or use our Contact facility at: RCHASH currently supports the SHA-1, SHA-2 and SHA-3 algorithm types. For SHA-2 and SHA-3, four hash total lengths are available: 224 bit, 256 bit, 384 bit or 512 bit. For the first call to RCHASH, the ALGORITHM parameter must be set as follows: 0001 for SHA-1, 0224 for SHA bit, 0256 for SHA bit, 0384 for SHA bit, 0512 for SHA bit, 2224 for SHA-512/224 (truncated), 2256 for SHA-512/256 (truncated), 3224 for SHA bit, 3256 for SHA bit, 3384 for SHA bit, 3512 for SHA bit. Subsequent calls may use the 9999 ALGORITHM setting to repeat the previous algorithm using additional data held in MESSAGE-STRING. Redvers Consulting Ltd Page 12

13 0180 INVALID ACTIVATION KEY. PLEASE PLACE YOUR ACTIVATION KEY IN THE LAST W.S. FIELD DAY TRIAL PERIOD EXPIRED OR CALL LIMIT REACHED When the Redvers Hashing Algorithm was ordered or downloaded, a 32 byte activation key should have been sent from Redvers Consulting to the ordering or downloading customer. This key should be copied into the VALUE literal of the last field coded in the WORKING-STORAGE SECTION. The program must then be compiled and linked into the calling application. Additional activation keys may be requested from your account manager or using our Contact facility at: The Redvers Hashing Algorithm can be downloaded or ordered on a free 30 day trial basis. Either the thirty days have now elapsed or the limit of 100 calls in a continuous execution has been reached. To purchase a fully functional perpetual product licence or to request an additional thirty day trial please contact your Redvers Consulting account manager or use our Contact facility at: Redvers Consulting Ltd Page 13

14 Appendix B - References [1] Redvers Encryption Device: [2] National Institute of Standards and Technology (NIST): [3] Federal Information Processing Standards Publication 180-4: [4] Redvers COBOL Cloaking Device: [5] Base64 from Wikipedia, the free encyclopedia: [6] The Keccak Reference (SHA-3): Redvers Consulting Ltd Page 14

15 Index A account manager, 6, 12, 13 activation key, 6, 13 algorithm, 5, 12 ALGORITHM, 7 apostrophes, 6 B Base64, 8, 14 batch, 5 binary, 12 byte-storage mode, 12 C Calling, 7 Cloaking Device, 6, 14 COBOL, 3, 5, 6 collision, 4 COMMUNICATION-BLOCK, 7 compile, 6 Contact, 6, 12, 13 copybooks, 6 D double quotes, 6 E Encryption Device, 14 F Feedback Messages, 12 FEEDBACK-CODE, 8 FEEDBACK-TEXT, 8 FIPS PUB 180-4, 4 H HASH-B64, 8 HASH-BIN, 7 HASH-HEX, 8 I intellectual property, 6 K Keccak Reference, 4, 14 L literals, 6 logical error, 12 M message, 7 message digest, 4, 5 MESSAGE-STRING, 7, 8 N NIST, 4, 14 O objects, 6 on-line, 5 P Parameters, 7 R RCHASH, 5, 6 References, 14 Redvers Consulting Ltd Page 15

16 S Sample Program, 9, 10 SHA-1, 4, 7, 12 SHA-2, 4, 7, 12 SHA-3, 4, 7, 12 single quotes, 6 source code, 6 speech marks, 6 STRING-LENGTH, 7, 8 sub-parameter, 7 T trial, 13 Redvers Consulting Ltd Page 16

17 Redvers Consulting Ltd 44 Broadway, London E15 1XH, UK

Redvers COBOL XML Interface. User Guide. CICS Generator RCCICXML Version 2.4

Redvers COBOL XML Interface. User Guide. CICS Generator RCCICXML Version 2.4 Redvers Consulting Limited Redvers COBOL XML Interface User Guide CICS Generator RCCICXML Version 2.4 s Preface... 5 Overview... 6 Installation... 7 Coding the COBOL Record Definition... 9 Field Names...

More information

COMPUTER EDUCATION TECHNIQUES, INC. (COBOL_QUIZ- 4.8) SA:

COMPUTER EDUCATION TECHNIQUES, INC. (COBOL_QUIZ- 4.8) SA: In order to learn which questions have been answered correctly: 1. Print these pages. 2. Answer the questions. 3. Send this assessment with the answers via: a. FAX to (212) 967-3498. Or b. Mail the answers

More information

APPENDIX E SOLUTION TO CHAPTER SELF-TEST CHAPTER 1 TRUE-FALSE FILL-IN-THE-BLANKS

APPENDIX E SOLUTION TO CHAPTER SELF-TEST CHAPTER 1 TRUE-FALSE FILL-IN-THE-BLANKS APPENDIX E SOLUTION TO CHAPTER SELF-TEST CHAPTER 1 2. F The AS/400 family of computers, as with all IBM midrange and mainframe computers, uses the EBCDIC coding system. 3. F Arrival sequence files do not

More information

TABLE 1 HANDLING. Chapter SYS-ED/ COMPUTER EDUCATION TECHNIQUES, INC.

TABLE 1 HANDLING. Chapter SYS-ED/ COMPUTER EDUCATION TECHNIQUES, INC. TABLE 1 HANDLING Chapter SYS-ED/ COMPUTER EDUCATION TECHNIQUES, INC Objectives You will learn: C C C C C C When to use a table How to allocate and initialize a table Differences between a subscripted and

More information

Using the PowerExchange CallProg Function to Call a User Exit Program

Using the PowerExchange CallProg Function to Call a User Exit Program Using the PowerExchange CallProg Function to Call a User Exit Program 2010 Informatica Abstract This article describes how to use the PowerExchange CallProg function in an expression in a data map record

More information

How to Setup MTO/JCL Spooler Housekeeping Facility for Enterprise Server

How to Setup MTO/JCL Spooler Housekeeping Facility for Enterprise Server How to Setup MTO/JCL Spooler Housekeeping Facility for Enterprise Server Overview You can configure your enterprise server so when your region starts a CICS transaction called JCL1 runs automatically to

More information

Network and System Security

Network and System Security Network and System Security Lecture 5 2/12/2013 Hashes and Message Digests Mohammad Almalag 1 Overview 1. What is a cryptographic hash? 2. How are hashes used? 3. One-Way Functions 4. Birthday Problem

More information

COBOL MOCK TEST COBOL MOCK TEST III

COBOL MOCK TEST COBOL MOCK TEST III http://www.tutorialspoint.com COBOL MOCK TEST Copyright tutorialspoint.com This section presents you various set of Mock Tests related to COBOL Framework. You can download these sample mock tests at your

More information

Creating a procedural computer program using COBOL Level 2 Notes for City & Guilds 7540 Unit 005

Creating a procedural computer program using COBOL Level 2 Notes for City & Guilds 7540 Unit 005 Creating a procedural computer program using COBOL Level 2 Notes for City & Guilds 7540 Unit 005 Compatible with Micro Focus Net Express 5.0 COBOL compiler Version 1 Tench Computing Ltd Pines Glendale

More information

CS 645 : Lecture 6 Hashes, HMAC, and Authentication. Rachel Greenstadt May 16, 2012

CS 645 : Lecture 6 Hashes, HMAC, and Authentication. Rachel Greenstadt May 16, 2012 CS 645 : Lecture 6 Hashes, HMAC, and Authentication Rachel Greenstadt May 16, 2012 Reminders Graded midterm, available on bbvista Project 3 out (crypto) Hash Functions MAC HMAC Authenticating SSL Man-in-the-middle

More information

Evolution of Sha-176 Algorithm

Evolution of Sha-176 Algorithm IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 2, Issue 2 (July-Aug. 2012), PP 18-22 Evolution of Sha-176 Algorithm Piyush Garg 1, Namita Tiwari 2 1,2 (Computer Science and Engineering,

More information

Introduction. Chapter 1:

Introduction. Chapter 1: Introduction Chapter 1: SYS-ED/Computer Education Techniques, Inc. Ch 1: 1 SYS-ED/Computer Education Techniques, Inc. 1:1 Objectives You will learn: New features of. Interface to COBOL and JAVA. Object-oriented

More information

4 bits Microcontroller

4 bits Microcontroller EM MICROELECTRONIC - MARIN SA Question & answer 4 bits Microcontroller Questions and s Copyright 2001, EM Microelectronic-Marin SA 1 www.emmicroelectronic.com 1 Q: Is there an instruction to rotate left

More information

Ethereum: 30 Tips & Tricks

Ethereum: 30 Tips & Tricks FREE SAMPLE MICHAL ZALECKI.COM Ethereum: 30 Tips & Tricks FOR SOLIDITY DEVELOPERS MICHAŁ by Michał ZAŁĘCKI Załęcki X TOOPLOOX MICHAŁ ZAŁĘCKI Table of Contents TABLE OF CONTENTS CONTENTS#CON TABLE OF CONTENTS

More information

Encryption. INST 346, Section 0201 April 3, 2018

Encryption. INST 346, Section 0201 April 3, 2018 Encryption INST 346, Section 0201 April 3, 2018 Goals for Today Symmetric Key Encryption Public Key Encryption Certificate Authorities Secure Sockets Layer Simple encryption scheme substitution cipher:

More information

Positive Pay Export BR-1004

Positive Pay Export BR-1004 Positive Pay Export BR-1004 Overview This Extended Solution to the Bank Reconciliation module creates a Positive Pay format export file from B/R Entries in a variety of different formats. We do not warrant

More information

SpongeShaker. Release 1.1

SpongeShaker. Release 1.1 SpongeShaker Release 1.1 November 22, 2014 Contents 1 spongeshaker API 3 1.1 spongeshaker.sha3 - SHA-3 proposal............................... 3 1.2 spongeshaker.hashing - Sponge as hash.............................

More information

PROGRAM-ID. BILLING. AUTHOR. GEORGE FOWLER-ED CHRISTENSON. INSTALLATION. TEXAS A & M UNIVERSITY-CSUS. DATE-WRITTEN.

PROGRAM-ID. BILLING. AUTHOR. GEORGE FOWLER-ED CHRISTENSON. INSTALLATION. TEXAS A & M UNIVERSITY-CSUS. DATE-WRITTEN. * WHEN KEYING A COBOL PROGRAM, THERE ARE TWO MARGINS THAT * * REQUIRE CONSIDERATION. THE 'A' MARGIN (COLUMNS 8 TO 11) AND * * THE 'B' MARGIN (COLUMNS 12 TO 72). ALL DIVISION NAMES, * * SECTION NAMES, PARAGRAPH

More information

IS-Dev Kit-7 & 7D User s Manual

IS-Dev Kit-7 & 7D User s Manual IS-Dev Kit-7 (ISC15ANP4) IS-Dev Kit-7 & 7D User s Manual Revision A Firmware Version 2.4 IS-Dev Kit-7D (ISC01P) NKK SWITCHES 7850 E. Gelding Drive Scottsdale, AZ 85260 Toll Free 1-877-2BUYNKK (877-228-9655)

More information

Ref:

Ref: Cryptography & digital signature Dec. 2013 Ref: http://cis.poly.edu/~ross/ 2 Cryptography Overview Symmetric Key Cryptography Public Key Cryptography Message integrity and digital signatures References:

More information

Digital signatures: How it s done in PDF

Digital signatures: How it s done in PDF Digital signatures: How it s done in PDF Agenda Why do we need digital signatures? Basic concepts applied to PDF Digital signatures and document workflow Long term validation Why do we need digital signatures?

More information

CGI Subroutines User's Guide

CGI Subroutines User's Guide FUJITSU Software NetCOBOL V11.0 CGI Subroutines User's Guide Windows B1WD-3361-01ENZ0(00) August 2015 Preface Purpose of this manual This manual describes how to create, execute, and debug COBOL programs

More information

X/Open CAE Specification

X/Open CAE Specification X/Open CAE Specification X/Open Company, Ltd. December 1991, X/Open Company Limited All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in

More information

Copyright Network Management Forum

Copyright Network Management Forum SPIRIT Platform Blueprint SPIRIT COBOL Language Portability Guide (SPIRIT Issue 3.0) Network Management Forum Copyright December 1995, Network Management Forum All rights reserved. No part of this publication

More information

Category: Informational September 2004

Category: Informational September 2004 Network Working Group R. Housley Request for Comments: 3874 Vigil Security Category: Informational September 2004 Status of this Memo A 224-bit One-way Hash Function: SHA-224 This memo provides information

More information

Type of Cobol Entries

Type of Cobol Entries Review of COBOL Coding Rules: Columns Use Explanation 1-6 sequence numbers or page and line numbers (optional) 7 Continuation, Comment, or starting a new page Previously used for sequencechecking when

More information

Cryptography and Network Security. Sixth Edition by William Stallings

Cryptography and Network Security. Sixth Edition by William Stallings Cryptography and Network Security Sixth Edition by William Stallings Chapter 13 Digital Signatures To guard against the baneful influence exerted by strangers is therefore an elementary dictate of savage

More information

COBOL Unbounded Loops A Diatribe On Their Omission From the COBOL Standard (and a Plea for Understanding)

COBOL Unbounded Loops A Diatribe On Their Omission From the COBOL Standard (and a Plea for Understanding) COBOL Unbounded Loops A Diatribe On Their Omission From the COBOL Standard (and a Plea for Understanding) August 11, 2016 Frank Swarbrick Principal Analyst Mainframe Applications Development FirstBank

More information

IS-Dev Kit-8 User Manual

IS-Dev Kit-8 User Manual IS-Dev Kit-8 User Manual Revision A IS-Dev Kit-8 Version 1.0 NKK SWITCHES 7850 E. Gelding Drive Scottsdale, AZ 85260 Toll Free 1-877-2BUYNKK (877-228-9655) Phone 480-991-0942 Fax 480-998-1435 e-mail

More information

DL/1. - Application programs are independent from the physical storage and access method.

DL/1. - Application programs are independent from the physical storage and access method. DL/1 OVERVIEW The historical approach to data processing was to have individual files dedicated to each application. This led to considerable data duplication, and therefore wasted space and additional

More information

Chapter 7: Statement Generator

Chapter 7: Statement Generator Chapter 7: Statement Generator CHAPTER 7: STATEMENT GENERATOR... 1 STATEMENT GENERATOR OVERVIEW... 1 PARAMETER FORMATS... 2 CONTROL (TYPE 3 PARAMETER)... 2 Type 3 Parameter Fields... 2 ADDITIONAL GROUPS

More information

Winter 2011 Josh Benaloh Brian LaMacchia

Winter 2011 Josh Benaloh Brian LaMacchia Winter 2011 Josh Benaloh Brian LaMacchia Symmetric Cryptography January 20, 2011 Practical Aspects of Modern Cryptography 2 Agenda Symmetric key ciphers Stream ciphers Block ciphers Cryptographic hash

More information

How to store external documents in your Vision files

How to store external documents in your Vision files Have you ever given any thought to the possibility of storing external documents in a Vision file? Documents are data, and the Vision files are done for storing data, right? Isn t it obvious? But what

More information

Chapter 2 INTERNAL SORTS. SYS-ED/ Computer Education Techniques, Inc.

Chapter 2 INTERNAL SORTS. SYS-ED/ Computer Education Techniques, Inc. Chapter 2 INTERNAL SORTS SYS-ED/ Computer Education Techniques, Inc Objectives You will learn: Sorting - role and purpose Advantages and tradeoffs associated with an internal and external sort How to code

More information

SHA Core, Xilinx Edition. Core Facts

SHA Core, Xilinx Edition. Core Facts SHA Core, Xilinx Edition May 3, 2017 Product Specification Algotronix 130-10 Calton Road Edinburgh, Scotland United Kingdom, EH8 8JQ Phone: +44 131 556 9242 E-mail: cores@algotronix.com URL: www.algotronix.com

More information

borzoi Manual Dragongate Technologies Ltd.

borzoi Manual Dragongate Technologies Ltd. borzoi Manual Dragongate Technologies Ltd. September 21, 2003 Contents 1 Introduction 1 2 Preliminaries 2 2.1 Header Files............................ 2 2.2 Type Definitions......................... 2

More information

IS-Dev Kit-8 User Manual

IS-Dev Kit-8 User Manual IS-Dev Kit-8 User Manual Revision E Version 3.0 IS18WWC1W Development Kit. NKK SWITCHES 7850 E. Gelding Drive Scottsdale, AZ 85260 Toll Free 1-877-2BUYNKK (877-228-9655) Phone 480-991-0942 Fax 480-998-1435

More information

Kurose & Ross, Chapters (5 th ed.)

Kurose & Ross, Chapters (5 th ed.) Kurose & Ross, Chapters 8.2-8.3 (5 th ed.) Slides adapted from: J. Kurose & K. Ross \ Computer Networking: A Top Down Approach (5 th ed.) Addison-Wesley, April 2009. Copyright 1996-2010, J.F Kurose and

More information

Integrity of messages

Integrity of messages Lecturers: Mark D. Ryan and David Galindo. Cryptography 2016. Slide: 106 Integrity of messages Goal: Ensure change of message by attacker can be detected Key tool: Cryptographic hash function Definition

More information

Transforming Legacy Code: The Pitfalls of Automation

Transforming Legacy Code: The Pitfalls of Automation Transforming Legacy Code: The Pitfalls of Automation By William Calcagni and Robert Camacho www.languageportability.com 866.731.9977 Code Transformation Once the decision has been made to undertake an

More information

IS-DEV KIT-9 User Manual

IS-DEV KIT-9 User Manual IS-DEV KIT-9 User Manual Revision C Firmware Version 1.0 NKK SWITCHES 7850 E. Gelding Drive Scottsdale, AZ 85260 Toll Free 1-877-2BUYNKK (877-228-9655) Phone 480-991-0942 Fax 480-998-1435 e-mail

More information

MarshallSoft AES. (Advanced Encryption Standard) Library for Delphi. Programmer's Manual

MarshallSoft AES. (Advanced Encryption Standard) Library for Delphi. Programmer's Manual MarshallSoft AES (Advanced Encryption Standard) Library for Delphi Programmer's Manual (AES4D) Version 4.1 June 26, 2017 This software is provided as-is. There are no warranties, expressed or implied.

More information

Chapter. Storeroom Module. Table of Contents

Chapter. Storeroom Module. Table of Contents Chapter 16 Module The module is used to record and track inventory and storeroom information. This Chapter describes how to use the Web Work module. Table of Contents 16.1 OVERVIEW OF THE STOREROOM MODULE...

More information

Micro Focus RM/COBOL. RM/COBOL Syntax Summary

Micro Focus RM/COBOL. RM/COBOL Syntax Summary Micro Focus RM/COBOL RM/COBOL Syntax Summary Contents Micro Focus The Lawn 22-30 Old Bath Road Newbury, Berkshire RG14 1QN UK http://www.microfocus.com Copyright Micro Focus 2017. All rights reserved.

More information

Section 1. The essence of COBOL programming. Mike Murach & Associates

Section 1. The essence of COBOL programming. Mike Murach & Associates Chapter 1 Introduction to COBOL programming 1 Section 1 The essence of COBOL programming The best way to learn COBOL programming is to start doing it, and that s the approach the chapters in this section

More information

Overview. CSC 580 Cryptography and Computer Security. Hash Function Basics and Terminology. March 28, Cryptographic Hash Functions (Chapter 11)

Overview. CSC 580 Cryptography and Computer Security. Hash Function Basics and Terminology. March 28, Cryptographic Hash Functions (Chapter 11) CSC 580 Cryptography and Computer Security Cryptographic Hash Functions (Chapter 11) March 28, 2017 Overview Today: Review Homework 8 solutions Discuss cryptographic hash functions Next: Study for quiz

More information

Hashing (Message Digest)

Hashing (Message Digest) Hashing (Message Digest) Hashing (Message Digest) Hashing (Message Digest) Hello There Hashing (Message Digest) What not Hash Function One way Needed properties for cryptographically secure hash: 1 Computationally

More information

Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms

Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of

More information

Cryptographic Hash Functions. William R. Speirs

Cryptographic Hash Functions. William R. Speirs Cryptographic Hash Functions William R. Speirs What is a hash function? Compression: A function that maps arbitrarily long binary strings to fixed length binary strings Ease of Computation: Given a hash

More information

MarshallSoft AES. (Advanced Encryption Standard) Reference Manual

MarshallSoft AES. (Advanced Encryption Standard) Reference Manual MarshallSoft AES (Advanced Encryption Standard) Reference Manual (AES_REF) Version 4.1 June 23, 2017 This software is provided as-is. There are no warranties, expressed or implied. Copyright (C) 2017 All

More information

ח'/סיון/תשע "א. RSA: getting ready. Public Key Cryptography. Public key cryptography. Public key encryption algorithms

ח'/סיון/תשע א. RSA: getting ready. Public Key Cryptography. Public key cryptography. Public key encryption algorithms Public Key Cryptography Kurose & Ross, Chapters 8.28.3 (5 th ed.) Slides adapted from: J. Kurose & K. Ross \ Computer Networking: A Top Down Approach (5 th ed.) AddisonWesley, April 2009. Copyright 19962010,

More information

Unicode Support. Chapter 2:

Unicode Support. Chapter 2: Unicode Support Chapter 2: SYS-ED/Computer Education Techniques, Inc. Ch 2: 1 SYS-ED/Computer Education Techniques, Inc. Ch 2: 1 Objectives You will learn: Unicode features. How to use literals and data

More information

GnuCOBOL Quick Reference

GnuCOBOL Quick Reference GnuCOBOL Quick Reference For Version 2.2 Final [7Sept2017] Gary L. Cutler (cutlergl@gmail.com). For updates Vincent B. Coen (vbcoen@gmail.com). This manual documents GnuCOBOL 2.2 Final, 7Sept2017 build.

More information

TIBCO ActiveMatrix BusinessWorks Plug-in for Data Conversion Release Notes

TIBCO ActiveMatrix BusinessWorks Plug-in for Data Conversion Release Notes TIBCO ActiveMatrix BusinessWorks Plug-in for Data Conversion Release Notes Software Release 4.2.0 November 2014 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER

More information

HAI Network Communication Protocol Description

HAI Network Communication Protocol Description Home Automation, Inc. HAI Network Communication Protocol Description This document contains the intellectual property of Home Automation, Inc. (HAI). HAI authorizes the use of this information for the

More information

RM/COBOL to RM/COBOL-85

RM/COBOL to RM/COBOL-85 Liant Software Corporation RM/COBOL to RM/COBOL-85 Conversion Guide Copyright 1989 2003. Liant Software Corporation. All rights reserved. No part of this publication may be reproduced, stored in a retrieval

More information

CSC 580 Cryptography and Computer Security

CSC 580 Cryptography and Computer Security CSC 580 Cryptography and Computer Security Cryptographic Hash Functions (Chapter 11) March 22 and 27, 2018 Overview Today: Quiz (based on HW 6) Graded HW 2 due Grad/honors students: Project topic selection

More information

CA Calendar Routines. Technical Manual

CA Calendar Routines. Technical Manual CA Calendar Routines Technical Manual r6 This documentation (the Documentation ) and related computer software program (the Software ) (hereinafter collectively referred to as the Product ) is for the

More information

Network Working Group Request for Comments: 4432 March 2006 Category: Standards Track

Network Working Group Request for Comments: 4432 March 2006 Category: Standards Track Network Working Group B. Harris Request for Comments: 4432 March 2006 Category: Standards Track Status of This Memo RSA Key Exchange for the Secure Shell (SSH) Transport Layer Protocol This document specifies

More information

Track down your CICS program bugs with TRACK

Track down your CICS program bugs with TRACK Track down your CICS program bugs with TRACK 1 TRACK provides on-line testing and debugging capabilities in CICS environments. It increases CICS reliability and improves productivity by enabling application

More information

Keccak. Final Paper. Team Bletchley. Chris Bentivenga Frederick Christie Michael Kitson

Keccak. Final Paper. Team Bletchley. Chris Bentivenga Frederick Christie Michael Kitson Keccak Final Paper Team Bletchley Chris Bentivenga Frederick Christie Michael Kitson Description of the Algorithm Keccak is the winner of NIST hash function competition, and is the accepted standard for

More information

Implementation of the AES as a Hash Function for Confirming the Identity of Software on a Computer System

Implementation of the AES as a Hash Function for Confirming the Identity of Software on a Computer System PNNL-1417 Implementation of the AES as a Hash Function for Confirming the Identity of Software on a Computer System R.R. Hansen R.. ass R.T. Kouzes N.D. Mileson January 23 Prepared for the U.S. Department

More information

EXgarde. EXvisitors. User Manual. UM0001.GB Issue 2 11/06/2015. TDSi Unit 10 Concept Park Innovation Close Poole Dorset BH12 4QT, UK

EXgarde. EXvisitors. User Manual.   UM0001.GB Issue 2 11/06/2015. TDSi Unit 10 Concept Park Innovation Close Poole Dorset BH12 4QT, UK EXgarde EXvisitors User Manual UM0001.GB Issue 2 11/06/2015 www.tdsi.co.uk TDSi Unit 10 Concept Park Innovation Close Poole Dorset BH12 4QT, UK Tel: +44 (0) 1202 723535 Fax: +44 (0) 1202 724975 Sales Enquiries:

More information

FIPS Non-Proprietary Security Policy

FIPS Non-Proprietary Security Policy Quantum Corporation Scalar Key Manager Software Version 2.0.1 FIPS 140-2 Non-Proprietary Security Policy Document Version 1.4 Last Update: 2010-11-03 8:43:00 AM 2010 Quantum Corporation. May be freely

More information

SMS Outbound. SMTP interface - v1.1

SMS Outbound. SMTP interface - v1.1 SMS Outbound SMTP interface - v1.1 Table of contents 1. Version history... 5 2. Conventions... 5 3. Introduction... 6 4. Gateway connection... 7 4.1 E-mail message format... 7 4.2 Header section... 7 4.3

More information

Computer Associates SRAM Sort Emulation

Computer Associates SRAM Sort Emulation Batch Mainframe applications in COBOL or PL/1 may use CA s SRAM sort on the mainframe. Mainframe Express does not support SRAM by default. SRAM sort is compatible to DFSORT (only the process of invocation

More information

Encryption I. An Introduction

Encryption I. An Introduction Encryption I An Introduction Reading List ADO and SQL Server Security A Simple Guide to Cryptography Protecting Private Data with the Cryptography Namespaces Using MD5 to Encrypt Passwords in a Database

More information

Chapter 8 Web Security

Chapter 8 Web Security Chapter 8 Web Security Web security includes three parts: security of server, security of client, and network traffic security between a browser and a server. Security of server and security of client

More information

COBOL for AIX. Source conversion utility (scu)

COBOL for AIX. Source conversion utility (scu) COBOL for AIX Source conversion utility (scu) COBOL for AIX Source conversion utility (scu) ii Source conversion utility (scu) Contents Source conversion utility (scu)..... 1 Source conversion utility

More information

Plaintext-Recovery Attacks Against Datagram TLS

Plaintext-Recovery Attacks Against Datagram TLS Information Security Group Royal Holloway, University of London 6th Feb 2012 Contents 1 Results 2 3 4 Padding Oracle Realisation Against OpenSSL 5 Attacking the GnuTLS Implementation of DTLS 6 Results

More information

About these Release Notes. This document contains important information about Pro*COBOL 12c Release 2 (12.2).

About these Release Notes. This document contains important information about Pro*COBOL 12c Release 2 (12.2). Pro*COBOL Release Notes 12c Release 2 (12.2) E85817-01 May 2017 Release Notes About these Release Notes This document contains important information about Pro*COBOL 12c Release 2 (12.2). It contains the

More information

Message authentication codes

Message authentication codes Message authentication codes Martin Stanek Department of Computer Science Comenius University stanek@dcs.fmph.uniba.sk Cryptology 1 (2017/18) Content Introduction security of MAC Constructions block cipher

More information

S. Erfani, ECE Dept., University of Windsor Network Security. All hash functions operate using the following general principles:

S. Erfani, ECE Dept., University of Windsor Network Security. All hash functions operate using the following general principles: 4.14 Simple Hash Functions All hash functions operate using the following general principles: a) The input string is viewed as a sequence of n-byte blocks. b) The input is processed one block at a time

More information

Cryptographic Hash Functions. Rocky K. C. Chang, February 5, 2015

Cryptographic Hash Functions. Rocky K. C. Chang, February 5, 2015 Cryptographic Hash Functions Rocky K. C. Chang, February 5, 2015 1 This set of slides addresses 2 Outline Cryptographic hash functions Unkeyed and keyed hash functions Security of cryptographic hash functions

More information

MQ Authenticate User Security Exit for z/os Overview

MQ Authenticate User Security Exit for z/os Overview MQ Authenticate User Security Exit for z/os Overview Capitalware Inc. Unit 11, 1673 Richmond Street, PMB524 London, Ontario N6G2N3 Canada sales@capitalware.com http://www.capitalware.com Table of Contents

More information

Gechstudentszone.wordpress.com

Gechstudentszone.wordpress.com CHAPTER -2 2.1 Basic Assembler Functions: The basic assembler functions are: ASSEMBLERS-1 Translating mnemonic language code to its equivalent object code. Assigning machine addresses to symbolic labels.

More information

Configuring Secure Socket Layer HTTP

Configuring Secure Socket Layer HTTP This feature provides Secure Socket Layer (SSL) version 3.0 support for the HTTP 1.1 server and HTTP 1.1 client within Cisco IOS software. SSL provides server authentication, encryption, and message integrity

More information

A comparative study of Message Digest 5(MD5) and SHA256 algorithm

A comparative study of Message Digest 5(MD5) and SHA256 algorithm Journal of Physics: Conference Series PAPER OPEN ACCESS A comparative study of Message Digest 5(MD5) and SHA256 algorithm To cite this article: D Rachmawati et al 208 J. Phys.: Conf. Ser. 978 026 View

More information

Configuring Secure Socket Layer HTTP

Configuring Secure Socket Layer HTTP This feature provides Secure Socket Layer (SSL) version 3.0 support for the HTTP 1.1 server and HTTP 1.1 client within Cisco IOS software. SSL provides server authentication, encryption, and message integrity

More information

ISO Data Element Definitions

ISO Data Element Definitions SECTION 4 ISO 8583 1987 DATA ELEMENT DEFINITIONS Overview...4-1 Bit Maps...4-2 Annotation Conventions For Data Element s...4-3 General Representation...4-3 Length s...4-4 Field Content s...4-5 Conventions

More information

ZENworks 11 Support Pack 4 Endpoint Security Utilities Reference. October 2016

ZENworks 11 Support Pack 4 Endpoint Security Utilities Reference. October 2016 ZENworks 11 Support Pack 4 Endpoint Security Utilities Reference October 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S.

More information

$DXM DBX Dictionary Maintenance Utility

$DXM DBX Dictionary Maintenance Utility 1. Introduction The information about the structure of a DBX Speedbase database is stored in a DBX data dictionary. Before you can actually create your DBX database, or compile a program using a DBX database,

More information

Computer Networks. Wenzhong Li. Nanjing University

Computer Networks. Wenzhong Li. Nanjing University Computer Networks Wenzhong Li Nanjing University 1 Chapter 7. Network Security Network Attacks Cryptographic Technologies Message Integrity and Authentication Key Distribution Firewalls Transport Layer

More information

CA Culprit for CA IDMS

CA Culprit for CA IDMS CA Culprit for CA IDMS User Modules Guide Release 18.5.00, 2nd Edition This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the

More information

Conversion Between Number Bases

Conversion Between Number Bases Conversion Between Number Bases MATH 100 Survey of Mathematical Ideas J. Robert Buchanan Department of Mathematics Summer 2018 General Number Bases Bases other than 10 are sometimes used in numeration

More information

Moving Data and Printing Information. The Move Statement has The following Format: Move Identifier-1 To Identifier-2. Move Literal-1 To Identifier-2

Moving Data and Printing Information. The Move Statement has The following Format: Move Identifier-1 To Identifier-2. Move Literal-1 To Identifier-2 and Printing Information The Move Statement has The following Format: Format 1 Move Identifier-1 To Identifier-2 Format2 Move Literal-1 To Identifier-2 The Move Statement has the following components Sending

More information

NEVADA ELLIS COMPUTING SOFTWARE TECHNOLOGY

NEVADA ELLIS COMPUTING SOFTWARE TECHNOLOGY NEVADA ELLIS COMPUTING SOFTWARE TECHNOLOGY 12-15-82 NEVADA COBOL PAGE 1 NEVADA COBOL Programmers' Reference Manual Edition II for use with Rev 2.1 or higher diskettes Copyright (C) 1979,1981,1982 by Ellis

More information

Hash Tables. Hashing Probing Separate Chaining Hash Function

Hash Tables. Hashing Probing Separate Chaining Hash Function Hash Tables Hashing Probing Separate Chaining Hash Function Introduction In Chapter 4 we saw: linear search O( n ) binary search O( log n ) Can we improve the search operation to achieve better than O(

More information

S. Erfani, ECE Dept., University of Windsor Network Security

S. Erfani, ECE Dept., University of Windsor Network Security 4.11 Data Integrity and Authentication It was mentioned earlier in this chapter that integrity and protection security services are needed to protect against active attacks, such as falsification of data

More information

Chapter 8 Security. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Chapter 8 Security. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Chapter 8 Security A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations; and can add,

More information

Network Working Group Request for Comments: 2202 Category: Informational NIST September 1997

Network Working Group Request for Comments: 2202 Category: Informational NIST September 1997 Network Working Group Request for Comments: 2202 Category: Informational P. Cheng IBM R. Glenn NIST September 1997 Status of This Memo Test Cases for HMAC-MD5 and HMAC-SHA-1 This memo provides information

More information

If you want to download a simple program for added/refreshing line numbers, go to the Links page.

If you want to download a simple program for added/refreshing line numbers, go to the Links page. !! 1 1. Getting Started 1.1 Introduction The aim of the ZingCOBOL is to give the basics of the COBOL programming language for anyone who knows a little bit about computers (not much) and preferably will

More information

Alliance Key Manager A Solution Brief for Partners & Integrators

Alliance Key Manager A Solution Brief for Partners & Integrators Alliance Key Manager A Solution Brief for Partners & Integrators Key Management Enterprise Encryption Key Management This paper is designed to help technical managers, product managers, and developers

More information

Lecture 6: Symmetric Cryptography. CS 5430 February 21, 2018

Lecture 6: Symmetric Cryptography. CS 5430 February 21, 2018 Lecture 6: Symmetric Cryptography CS 5430 February 21, 2018 The Big Picture Thus Far Attacks are perpetrated by threats that inflict harm by exploiting vulnerabilities which are controlled by countermeasures.

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2 Objectives

More information

Revision History Revision 0 (T10/06-225r0): Posted to the T10 web site on 4 May 2006.

Revision History Revision 0 (T10/06-225r0): Posted to the T10 web site on 4 May 2006. To: INCITS T10 Committee From: Matt Ball, Quantum Corporation Date: March 13, 2007 Subject: SSC-3: Key Entry using Encapsulating Security Payload (ESP) Revision History Revision 0 (T10/06-225r0): Posted

More information

Cryptography. Summer Term 2010

Cryptography. Summer Term 2010 Summer Term 2010 Chapter 2: Hash Functions Contents Definition and basic properties Basic design principles and SHA-1 The SHA-3 competition 2 Contents Definition and basic properties Basic design principles

More information

A hash function is strongly collision-free if it is computationally infeasible to find different messages M and M such that H(M) = H(M ).

A hash function is strongly collision-free if it is computationally infeasible to find different messages M and M such that H(M) = H(M ). CA4005: CRYPTOGRAPHY AND SECURITY PROTOCOLS 1 5 5.1 A hash function is an efficient function mapping binary strings of arbitrary length to binary strings of fixed length (e.g. 128 bits), called the hash-value

More information

Semi-free start collision attack on Blender

Semi-free start collision attack on Blender Semi-free start collision attack on Blender Xu Liangyu and Li Ji Sony China Research Laboratory {Liangyu.Xu, Ji.Li}@sony.com.cn Abstract. Blender is a cryptographic hash function submitted to NIST s SHA3

More information

Item A The first line contains basic information about the dump including its code, transaction identifier and dump identifier. The Symptom string

Item A The first line contains basic information about the dump including its code, transaction identifier and dump identifier. The Symptom string 1 2 Item A The first line contains basic information about the dump including its code, transaction identifier and dump identifier. The Symptom string contains information which is normally used to perform

More information