Previous topic |
Next topic |
Contents |
Index |
Contact z/OS |
Library |
PDF
How MDCs Are Used z/OS Cryptographic Services ICSF Application Programmer's Guide SA22-7522-16 |
|
When a message is sent, an application program can generate a modification detection code for it using the MDC generation callable service. The service computes the modification detection code, a 128-bit value, using a one-way cryptographic function and the message text (which itself may be in clear or encrypted form). The originator of the message ensures that the MDC is transmitted with integrity to the intended receiver of the message. For example, the MDC could be published in a reliable source of public information. When the receiver gets the message, an application program calls the MDC callable service. The callable service generates an MDC by using the same one-way cryptographic function and the message text. The application program can compare the new MDC with the one generated by the originator of the message. If the MDCs match, the receiver knows that the message was not altered. In a similar manner, MDCs can be used to ensure the integrity of data stored on the system or on removable media, such as tape. By using MDCs, you get the following benefits:
SHA-1 is a FIPS standard required for DSS. MD5 is a hashing algorithm used to derive Message Digests in Digital Signature applications. |
Copyright IBM Corporation 1990, 2014
|