ZIP/390 : Application Programming Interface. MVS et VSE
|
|
|
- Eustacia Holmes
- 9 years ago
- Views:
Transcription
1 Avec les APIs ZIP/390, tout programmeur se retrouvera aisément dans les exemples ci-après. Quelques exemples en Assembleur, COBOL et CICS Compression en ASSEMBLER MVS et VSE ACTION=ZIP Compression «ZIP390.FILE1.TXT» vers «ZIP390.FILE1.ZIP» CALL ZIPAPI,ZIPPARMS,VL ZIPPARMS DS 0H * PARMS END WITH X'00' MAX LENGTH OF PARM IS 80 BYTES * ALL PARMS END WITH X'00' DC CL8'ZIPPARMS' START OF PARMS DC C'ACTION=ZIP' DC C'IFILE=DSN/ZIP390.FILE1.TXT' DC C'ARCHIVE=DSN/ZIP390.FILE1.ZIP' END OF ZIPPARMS Compression en COBOL ACTION=ZIP Compression «ZIP390.FILE1.TXT» vers «ZIP390.FILE1.ZIP» WORKING STORAGE SECTION. 01 ZIPPARMS. 05 PARMSTART PIC X(8) VALUE 'ZIPPARMS'. 05 FILLER PIC X(10) VALUE 'ACTION=ZIP'. 05 FILLER PIC X(35) VALUE 'IFILE=DSN/ZIP390.FILE1.TXT'. 05 FILLER PIC X(36) VALUE 'ARCHIVE=DSN/ZIP390.FILE1.ZIP'. 05 PARMEND PIC X(1) VALUE X'00'. PROCEDURE DIVISION. CALL 'ZIPAPI' USING ZIPPARMS RETURNING RETURN CODE.
2 Cryptage AES en COBOL ENCRYPT. SET Z ENCRYPT TO TRUE. SET Z FIRST ONLY TO TRUE. SET Z AES 128 TO TRUE. SET Z CRYPTO MODE OFB TO TRUE. SET Z CRYPTO FACILITY ZIP TO TRUE. * NEXT ONLY SUPPORT Z AES 128 AND DOES NOT SUPPORT * Z CRYPTO MODE CFB * ALSO YOUR zseries HARDWARE MUST HAVE CPACF ENABLED * SET Z CRYPTO FACILITY CPACF TO TRUE. MOVE MY IV TO Z CRYPTO IV. MOVE MY KEY TO Z CRYPTO KEY. MOVE LOW VALUES TO OUTPUT DATA. * SET LENGTH OF INPUT/OUTPUT BUFFERS MOVE LENGTH OF INPUT DATA TO Z INPUT BUFFER LENGTH. MOVE LENGTH OF OUTPUT DATA TO Z OUTPUT BUFFER LENGTH. * D21ZSETP WILL SET THE ADDRESS OF PARM1 IN PARM2 CALL 'D21ZSETP' USING INPUT DATA, Z INPUT BUFFER PTR. CALL 'D21ZSETP' USING OUTPUT DATA, Z OUTPUT BUFFER PTR. Exemple de compression GZIP MOVE LENGTH OF INPUT DATA TO Z INPUT BUFFER LENGTH. MOVE LENGTH OF OUTPUT DATA TO Z OUTPUT BUFFER LENGTH. CALL 'D21ZSETP' USING INPUT DATA, Z INPUT BUFFER PTR. CALL 'D21ZSETP' USING OUTPUT DATA, Z OUTPUT BUFFER PTR. MOVE LENGTH OF ZIP390 TO Z CA LENGTH. * SET ACTION (ZIP, UNZIP, GZIP, GUNZIP, etc.) SET Z GZIP TO TRUE * PERFORM TRANSLATION SET Z TEXT TO TRUE
3 Invocation via CICS CICS EXEC CICS LINK PROGRAM('ZIPCICS') COMMAREA(ZIP390) LENGTH(Z CA LENGTH) END EXEC. Définition de la COMMAREA * * * This commarea is pass to either ZIP390 or ZIPCICS * * * 01 ZIP Z ID PIC X(6) VALUE 'ZIP390'. 10 Z CA LENGTH PIC S9(4) VALUE 0 COMP. 10 Z RETURN CODE PIC S9(8) VALUE 0 COMP. 88 Z RETURN NORMAL VALUE Z RETURN ERR ANY VALUE Z RETURN ERR STREAM VALUE Z RETURN ERR DATA VALUE Z RETURN ERR MEM VALUE Z RETURN ERR BUF VALUE Z RETURN ERR VER VALUE Z RETURN ERR LEN VALUE Z RETURN BAD CRYPTOFACILITY VALUE Z RETURN BAD CRYPTOMETHOD VALUE Z RETURN BAD CRYPTOMODE VALUE Z RETURN BAD CRYPTOBIT VALUE Z RETURN NO PASSWORD VALUE Z RETURN BAD PASSWORD VALUE Z RETURN SHORT PASSWORD VALUE Z RETURN LONG PASSWORD VALUE Z RETURN EXPIRED LICENSE VALUE Z RETURN NOT LICENSED VALUE Z RETURN BAD ACTION VALUE Z RETURN BAD CRC VALUE Z RETURN SIZE ERR VALUE Z RETURN AUTHENTICATE ERR VALUE Z ACTION PIC X(1) VALUE X'03'. 88 Z ZIP VALUE X'01'. 88 Z UNZIP VALUE X'02'. 88 Z GZIP VALUE X'03'. 88 Z GUNZIP VALUE X'04'. 88 Z DEFLATE VALUE X'05'. 88 Z INFLATE VALUE X'06'. 88 Z FCMPR VALUE X'07'. 88 Z FUNCMPR VALUE X'08'. 88 Z SUNZIP VALUE X'09'. 88 Z ENCRYPT VALUE X'11'. 88 Z DECRYPT VALUE X'12'. 88 Z FILELIST VALUE X'20'. 88 Z VIEW CONSOLE VALUE X'21'. 88 Z VIEW PRINTER VALUE X'22'. 10 Z ARCHIVE PIC X(1) VALUE X'00'. 88 Z CREATE ARCHIVE VALUE X'00'.
4 88 Z CREATE SE ARCHIVE VALUE X'01'. 88 Z ADD FILE VALUE X'02'. 88 Z REMOVE FILE VALUE X'03'. 88 Z CLOSE ARCHIVE VALUE X'04'. 10 Z METHOD PIC X(1) VALUE X'08'. 88 Z DEFLATED VALUE X'08'. 10 Z COMPRESSION LEVEL PIC X(1) VALUE X'05'. 88 Z NONE VALUE X'00'. 88 Z SUPERFAST VALUE X'01'. 88 Z FAST VALUE X'03'. 88 Z NORMAL VALUE X'05'. 88 Z HIGH VALUE X'07'. 88 Z MAXIMUM VALUE X'09'. 10 Z MODE PIC X(1) VALUE X'01'. 88 Z TEXT VALUE X'01'. 88 Z BINARY VALUE X'02'. 10 Z CALLING PIC X(1) VALUE X'00'. 88 Z FIRST ONLY VALUE X'00'. 88 Z FIRST VALUE X'01'. 88 Z CONTINUE VALUE X'02'. 88 Z LAST VALUE X'03'. 10 Z CALLING FLUSH PIC X(1) VALUE X'00'. 88 Z FLUSH NO VALUE X'00'. 88 Z FLUSH PARTIAL VALUE X'01'. 88 Z FLUSH SYNC VALUE X'02'. 88 Z FLUSH FULL VALUE X'03'. 10 Z FORCE CRC PIC X(1) VALUE X'00'. 88 Z FORCE CRC NO VALUE X'00'. 88 Z FORCE CRC YES VALUE X'01'. 10 Z CRYPTO IV PIC X(16) VALUE LOW VALUES. 10 Z CRYPTO KEY PIC X(32) VALUE LOW VALUES. 10 Z CRYPTO MODE PIC X(1) VALUE X'00'. 88 Z CRYPTO MODE ECB VALUE X'01'. 88 Z CRYPTO MODE CBC VALUE X'02'. 88 Z CRYPTO MODE CFB VALUE X'03'. 88 Z CRYPTO MODE OFB VALUE X'04'. 88 Z CRYPTO MODE CTR VALUE X'05'. * Next 2 are Reserved for internal use only 88 Z CRYPTO MODE WZ VALUE X'06'. 88 Z CRYPTO MODE PK VALUE X'07'. 10 Z CRYPTO FACILITY PIC X(1) VALUE X'00'. 88 Z CRYPTO FACILITY ZIP VALUE X'00'. 88 Z CRYPTO FACILITY CPACF VALUE X'01'. * Next 2 are Reserved for future use 88 Z CRYPTO FACILITY ICSF SW VALUE X'02'. 88 Z CRYPTO FACILITY ICSF HW VALUE X'03'. 10 Z SUBTASKS PIC 9(4) VALUE 0 COMP. 10 FILLER PIC X(12) VALUE LOW VALUES. 10 Z CRYPTO METHOD PIC X(8) VALUE LOW VALUES. 88 Z AES 128 VALUE 'AES,128'. 88 Z AES 192 VALUE 'AES,192'. 88 Z AES 256 VALUE 'AES,256'. 88 Z ARC4 VALUE 'ARC4'. 88 Z A2E VALUE 'A2E'. 88 Z E2A VALUE 'E2A'. 10 Z COMPRESSION TIME PIC S9(7) VALUE 0 COMP Z TRANSLATE TABLE PIC X(12) VALUE LOW VALUES. 10 FILLER PIC X(12) VALUE LOW VALUES. 10 Z DATE MMDDYYYY PIC X(8) VALUE LOW VALUES. 10 Z TIME HHMMSS PIC X(6) VALUE LOW VALUES.
5 10 FILLER PIC X(2) VALUE LOW VALUES. 10 FILLER PIC X(4) VALUE LOW VALUES. 10 Z TSQ LENGTH PIC 9(8) VALUE COMP. 10 Z GMT OFFSET SECONDS PIC 9(8) VALUE 0 COMP. 10 Z INPUT BUFFER PTR POINTER. 10 Z INPUT BUFFER LENGTH PIC 9(8) VALUE 0 COMP. 10 Z OUTPUT BUFFER PTR POINTER. 10 Z OUTPUT BUFFER LENGTH PIC 9(8) VALUE 0 COMP. 10 Z OUTPUT SIZE PIC 9(8) VALUE 0 COMP. 10 Z INPUT TSQID PIC X(8) VALUE LOW VALUES. 10 Z OUTPUT TSQID PIC X(8) VALUE LOW VALUES. 10 Z TSQ STORAGE PIC X(4) VALUE 'AUX'. 88 Z TSQ AUX VALUE 'AUX'. 88 Z TSQ MAIN VALUE 'MAIN'. 10 Z SYSID PIC X(4) VALUE LOW VALUES. 10 Z FILE PIC X(128) VALUE LOW VALUES. 10 FILLER PIC X(64) VALUE LOW VALUES. 10 Z PASSWORD PIC X(80) VALUE LOW VALUES. 10 Z SEPATH PIC X(32) VALUE LOW VALUES. * -- * * BELOW IS SPECIAL USE AND IS "READ ONLY" * * * 10 Z FILE CRC PIC 9(8) VALUE 0 COMP. 10 Z FILE INPUT SIZE 64 PIC 9(8) VALUE 0 COMP. 10 Z FILE INPUT SIZE PIC 9(8) VALUE 0 COMP. 10 Z FILE OUTPUT SIZE 64 PIC 9(8) VALUE 0 COMP. 10 Z FILE OUTPUT SIZE PIC 9(8) VALUE 0 COMP. 10 Z EXTRA FIELD PIC 9(8) VALUE 0 COMP. 10 Z EXTRA LEN PIC 9(4) VALUE 0 COMP. 10 FILLER PIC X(2) VALUE LOW VALUES. 10 FILLER PIC X(4) VALUE LOW VALUES. 10 Z SAVE INPUT BUFFER LEN PIC 9(4) VALUE 0 COMP. 10 Z SYSIN PTR POINTER. 10 Z SYSPRT PTR POINTER. 10 Z D21ZTAB PTR POINTER. 10 Z SBCSTAB PTR POINTER. 10 Z STREAM PIC X(56) VALUE LOW VALUES. 10 Z SAVE OUTPUT PTR POINTER. 10 Z SAVE ARCHIVE PTR POINTER. 10 Z CRYPTO BIT PIC 9(8) VALUE 0 COMP. 10 Z CRYPTO SIZE PIC 9(8) VALUE 0 COMP. 10 Z CRYPTO F CTX PIC 9(8) VALUE 0 COMP. 10 Z ZIP STATUS PIC X(1) VALUE LOW VALUES. 10 FILLER PIC X(1) VALUE LOW VALUES. 10 Z PASSWORD LEN PIC S9(4) VALUE 0 COMP. 10 Z CRYPTO PSVER1 PIC X(16) VALUE LOW VALUES. 10 Z CRYPTO PSVER2 PIC X(16) VALUE LOW VALUES. 10 Z CRYPTO LAST REM PIC 9(8) VALUE 0 COMP. 10 FILLER PIC X(24) VALUE LOW VALUES.
Tools for Managing Big Data Analytics on z/os
Tools for Managing Big Data Analytics on z/os Mike Stebner, Joe Sturonas PKWARE, Inc. Wednesday, March 12, 2014 Session ID 14948 Test link: www.share.org Introduction Heterogeneous Analysis Addressing
Password-based encryption in ZIP files
Password-based encryption in ZIP files Dmitri Gabbasov December 15, 2015 Abstract In this report we give an overview of the encryption schemes used in the ZIP file format. We first give an overview of
UM0586 User manual. STM32 Cryptographic Library. Introduction
User manual STM32 Cryptographic Library Introduction This manual describes the API of the STM32 cryptographic library (STM32-CRYP-LIB) that supports the following cryptographic algorithms: AES-128, AES-192,
How To Attack A Block Cipher With A Key Key (Dk) And A Key (K) On A 2Dns) On An Ipa (Ipa) On The Ipa 2Ds (Ipb) On Pcode)
Cryptography and Network Security Chapter 6 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 6 Block Cipher Operation Many savages at the present day regard
Alliance AES Encryption for IBM i Solution Brief
Encryption & Tokenization Alliance AES Encryption for IBM i Solution Brief A Complete AES Encryption Solution Alliance AES Encryption for IBM i provides AES encryption for sensitive data everywhere it
Table of Contents. Cisco Using the Cisco IOS Firewall to Allow Java Applets From Known Sites while Denying Others
Cisco IOS Firewall to Allow Java Applets From Known Sites w Table of Contents Using the Cisco IOS Firewall to Allow Java Applets From Known Sites while Denying Others...1 Introduction...1 To Deny Java
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
SECUDE AG. FinallySecure Enterprise Cryptographic Module. FIPS 140-2 Security Policy
SECUDE AG FinallySecure Enterprise Cryptographic Module (SW Version: 1.0) FIPS 140-2 Security Policy Document Version 2.4 04/22/2010 Copyright SECUDE AG, 2010. May be reproduced only in its original entirety
Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch
1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...
Cryptography and Network Security Chapter 15
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 15 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North
Modes of Operation of Block Ciphers
Chapter 3 Modes of Operation of Block Ciphers A bitblock encryption function f: F n 2 Fn 2 is primarily defined on blocks of fixed length n To encrypt longer (or shorter) bit sequences the sender must
GNUTLS. a Transport Layer Security Library This is a Draft document Applies to GnuTLS 1.0.13. by Nikos Mavroyanopoulos
GNUTLS a Transport Layer Security Library This is a Draft document Applies to GnuTLS 1.0.13 by Nikos Mavroyanopoulos ii Copyright c 2001,2002,2003 Nikos Mavroyanopoulos Permission is granted to copy, distribute
Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2
Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2 FIPS 140 2 Non Proprietary Security Policy FIPS Security Level: 1 Document Version: 1.1 Prepared for: Prepared
Error oracle attacks and CBC encryption. Chris Mitchell ISG, RHUL http://www.isg.rhul.ac.uk/~cjm
Error oracle attacks and CBC encryption Chris Mitchell ISG, RHUL http://www.isg.rhul.ac.uk/~cjm Agenda 1. Introduction 2. CBC mode 3. Error oracles 4. Example 1 5. Example 2 6. Example 3 7. Stream ciphers
CS155. Cryptography Overview
CS155 Cryptography Overview Cryptography Is n A tremendous tool n The basis for many security mechanisms Is not n The solution to all security problems n Reliable unless implemented properly n Reliable
Package PKI. July 28, 2015
Version 0.1-3 Package PKI July 28, 2015 Title Public Key Infrastucture for R Based on the X.509 Standard Author Maintainer Depends R (>= 2.9.0),
AES1. Ultra-Compact Advanced Encryption Standard Core. General Description. Base Core Features. Symbol. Applications
General Description The AES core implements Rijndael encoding and decoding in compliance with the NIST Advanced Encryption Standard. Basic core is very small (start at 800 Actel tiles). Enhanced versions
CSci 530 Midterm Exam. Fall 2012
CSci 530 Midterm Exam Fall 2012 Instructions: Show all work. No electronic devices are allowed. This exam is open book, open notes. You have 100 minutes to complete the exam. Please prepare your answers
The Encryption Technology of Automatic Teller Machine Networks
Software Engineering 4C03 Winter 2005 The Encryption Technology of Automatic Teller Machine Networks Researcher: Shun Wong Last revised: April 2nd, 2005 1 Introduction ATM also known as Automatic Teller
Sharing Secrets Using Encryption Facility
Sharing Secrets Using Encryption Facility Eysha S. Powers IBM Corporation Insert Custom Session QR if Desired Tuesday, August 11, 2015: 6:00pm 7:00pm Session Number 17624 Cryptography is used in a variety
Data Encryption WHITE PAPER ON. Prepared by Mohammed Samiuddin. www.itmr.ac.in
01 0110 0001 01101 WHITE PAPER ON Data Encryption Prepared by Mohammed Samiuddin www.itmr.ac.in Contents INTRODUCTION... 2 NEED FOR DATA ENCRYPTION... 3 DUE CARE... 3 REPUTATIONAL RISK... 3 REGULATORY
CS3235 - Computer Security Third topic: Crypto Support Sys
Systems used with cryptography CS3235 - Computer Security Third topic: Crypto Support Systems National University of Singapore School of Computing (Some slides drawn from Lawrie Brown s, with permission)
The Impact of Cryptography on Platform Security
The Impact of Cryptography on Platform Security Ernie Brickell Intel Corporation 2/28/2012 1 Security is Intel s Third Value Pillar Intel is positioning itself to lead in three areas: energy-efficient
Secure Database Backups with SecureZIP
Secure Database Backups with SecureZIP A pproved procedures for insuring database recovery in the event of a disaster call for backing up the database and storing a copy of the backup offsite. Given the
Pulse Secure, LLC. January 9, 2015
Pulse Secure Network Connect Cryptographic Module Version 2.0 Non-Proprietary Security Policy Document Version 1.1 Pulse Secure, LLC. January 9, 2015 2015 by Pulse Secure, LLC. All rights reserved. May
Northrop Grumman M5 Network Security SCS Linux Kernel Cryptographic Services. FIPS Security Policy Version 2.42. www.northropgrumman.
Northrop Grumman M5 Network Security SCS Linux Kernel Cryptographic Services FIPS Security Policy Version 2.42 www.northropgrumman.com/m5/ SCS Linux Kernel Cryptographic Services Security Policy Version
MarshallSoft AES. (Advanced Encryption Standard) Reference Manual
MarshallSoft AES (Advanced Encryption Standard) Reference Manual (AES_REF) Version 3.0 May 6, 2015 This software is provided as-is. There are no warranties, expressed or implied. Copyright (C) 2015 All
WINTER SCHOOL ON COMPUTER SECURITY. Prof. Eli Biham
WINTR SCHOOL ON COMPUTR SCURITY Prof. li Biham Computer Science Department Technion, Haifa 3200003, Israel January 27, 2014 c li Biham c li Biham - January 27, 2014 1 Cryptanalysis of Modes of Operation
Security Policy: Key Management Facility Crypto Card (KMF CC)
Security Policy: Key Management Facility Crypto Card (KMF CC) Version 2.12.2 2/7/11 1.0 Introduction 3 1.1 Scope 3 1.2 Overview 3 1.3 KMF CC Implementation 4 1.4 KMF CC HW/SW version numbers 4 1.5 KMF
Yubico YubiHSM Monitor
Yubico YubiHSM Monitor Test utility for the YubiHSM Document Version: 1.1 May 24, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company s flagship
OPTIMIZE DMA CONFIGURATION IN ENCRYPTION USE CASE. Guillène Ribière, CEO, System Architect
OPTIMIZE DMA CONFIGURATION IN ENCRYPTION USE CASE Guillène Ribière, CEO, System Architect Problem Statement Low Performances on Hardware Accelerated Encryption: Max Measured 10MBps Expectations: 90 MBps
lundi 1 octobre 2012 In a set of N elements, by picking at random N elements, we have with high probability a collision two elements are equal
Symmetric Crypto Pierre-Alain Fouque Birthday Paradox In a set of N elements, by picking at random N elements, we have with high probability a collision two elements are equal N=365, about 23 people are
SkyRecon Cryptographic Module (SCM)
SkyRecon Cryptographic Module (SCM) FIPS 140-2 Documentation: Security Policy Abstract This document specifies the security policy for the SkyRecon Cryptographic Module (SCM) as described in FIPS PUB 140-2.
Network Security - ISA 656 Introduction to Cryptography
Network Security - ISA 656 Angelos Stavrou September 18, 2007 Codes vs. K = {0, 1} l P = {0, 1} m C = {0, 1} n, C C E : P K C D : C K P p P, k K : D(E(p, k), k) = p It is infeasible to find F : P C K Let
Chapter 6 Electronic Mail Security
Cryptography and Network Security Chapter 6 Electronic Mail Security Lectured by Nguyễn Đức Thái Outline Pretty Good Privacy S/MIME 2 Electronic Mail Security In virtually all distributed environments,
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0 Accellion, Inc. December 24, 2009 Copyright Accellion, Inc. 2009. May be reproduced only in its original entirety
STIM202 Evaluation Kit
Table of contents: 1 FEATURES... 2 2 GENERAL DESCRIPTIONS AND SYSTEM CONTENTS... 2 3 SYSTEM REQUIREMENTS... 2 4 GETTING STARTED... 3 4.1 INSTALLATION OF NI-SERIAL CABLE ASSEMBLY DRIVER... 3 4.2 INSTALLATION
Advanced Encryption Standard (AES) User's Guide
Advanced Encryption Standard (AES) User's Guide Version 1.00 BETA For use with AES versions 1.6 and above Date: 11-Feb-2015 11:23 All rights reserved. This document and the associated software are the
SeChat: An AES Encrypted Chat
Name: Luis Miguel Cortés Peña GTID: 901 67 6476 GTG: gtg683t SeChat: An AES Encrypted Chat Abstract With the advancement in computer technology, it is now possible to break DES 56 bit key in a meaningful
Encrypting MySQL data at Google. Jonas Oreland and Jeremy Cole
Encrypting MySQL data at Google Jonas Oreland and Jeremy Cole bit.ly/google_innodb_encryption Jonas Oreland!! Software Engineer at Google Has worked on/with MySQL since 2003 Has a current crush on Taylor
Triathlon of Lightweight Block Ciphers for the Internet of Things
NIST Lightweight Cryptography Workshop 2015 Triathlon of Lightweight Block Ciphers for the Internet of Things Daniel Dinu, Yann Le Corre, Dmitry Khovratovich, Leo Perrin, Johann Großschädl, Alex Biryukov
ISO 27000 Information Security Management Systems Professional
ISO 27000 Information Security Management Systems Professional Professional Certifications Sample Questions Sample Questions 1. A single framework of business continuity plans should be maintained to ensure
Configuring and Tuning SSH/SFTP on z/os
Configuring and Tuning SSH/SFTP on z/os Kirk Wolf / Steve Goetze Dovetailed Technologies [email protected] dovetail.com Monday, March 10, 2014, 1:30PM Session: 14787 www.share.org Session Info/Eval link
Cryptography Overview
Cryptography Overview Cryptography Is n A tremendous tool n The basis for many security mechanisms Is not n The solution to all security problems n Reliable unless implemented properly n Reliable unless
AN3270 Application note
Application note Using the STM8L16x AES hardware accelerator Introduction The purpose of cryptography is to protect sensitive data to avoid it being read by unauthorized persons. There are many algorithms
1. a. Define the properties of a one-way hash function. (6 marks)
1. a. Define the properties of a one-way hash function. (6 marks) A hash function h maps arbitrary length value x to fixed length value y such that: Hard to reverse. Given value y not feasible to find
Waspmote Encryption Libraries. Programming guide
Waspmote Encryption Libraries Programming guide Index Document version: v4.3-01/2015 Libelium Comunicaciones Distribuidas S.L. INDEX 1. General Concepts... 4 2. Integrity... 7 2.1. Waspmote Libraries...7
Cryptography and Security
Cunsheng DING Version 3 Lecture 17: Electronic Mail Security Outline of this Lecture 1. Email security issues. 2. Detailed introduction of PGP. Page 1 Version 3 About Electronic Mail 1. In virtually all
Network Security Essentials Chapter 7
Network Security Essentials Chapter 7 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 7 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North to appear,
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure Email
CS 393 Network Security Nasir Memon Polytechnic University Module 11 Secure Email Course Logistics HW 5 due Thursday Graded exams returned and discussed. Read Chapter 5 of text 4/2/02 Module 11 - Secure
FL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE. SSL/FTP (File Transfer Protocol over Secure Sockets Layer)
FL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE This troubleshooting guide covers secure file transfers using the SFTP and SSL/FTP file transfer protocols for Claims, POC, and Medical EDI transmissions.
P309 - Proofpoint Encryption - Decrypting Secure Messages Business systems
Procedure P309 - Proofpoint Encryption - Decrypting Secure Messages Business systems P309 - Page: Page 1 of 12 Date of Release: 23 February 2011 Status: Final Document Reference: Title: P309 Release Number:
MatrixSSL Developer s Guide
MatrixSSL Developer s Guide This document discusses developing with MatrixSSL. It includes instructions on integrating MatrixSSL into an application and a description of the configurable options for modifying
Automatic Encryption With V7R1 Townsend Security
Automatic Encryption With V7R1 Townsend Security 724 Columbia Street NW, Suite 400 Olympia, WA 98501 360.359.4400 THE ENCRYPTION COMPANY 25 years experience data communication and data security Recognized
RFG Secure FTP. Web Interface
RFG Secure FTP Web Interface Step 1: Getting to the Secure FTP Web Interface: Open your preferred web browser and type the following address: http://ftp.raddon.com After you hit enter, you will be taken
Crypto and Disaster Recovery. Greg Boyd [email protected] www.mainframecrypto.com
Crypto and Disaster Recovery Greg Boyd [email protected] www.mainframecrypto.com October 2014 Agenda Crypto and Disaster Recovery How Do You Do DR? Technology Hardware Domains Master Keys Restoring
Encrypting a Single Customer View file using WinZip
Encrypting a Single Customer View file using WinZip Introduction As part of the Financial Services Compensation Scheme (FSCS) Faster Payout project, deposit takers are required to send a sample Single
User Guide: Synei Products
2013 User Guide: Synei Products LEARN HOW TO USE SYNEI PRODUCTS BRITNEY BILLARY AQUINO SYNEI www.synei.com Page 1 Table of Contents Disclaimer. Page 2 Installing Synei Products.Page 2 How to Use System
RELEASE NOTES. Table of Contents. Scope of the Document. [Latest Official] ADYTON Release 2.12.9 - corrections. ADYTON Release 2.12.
Table of Contents Scope of the Document... 1 [Latest Official] ADYTON Release 2.12.9... 1 ADYTON Release 2.12.4... 1 ADYTON Release 2.9.3... 3 ADYTON Release 2.7.7... 3 ADYTON Release 2.6.2... 4 ADYTON
IronKey Data Encryption Methods
IronKey Data Encryption Methods An IronKey Technical Brief November 2007 Information Depth:Technical Introduction IronKey is dedicated to building the world s most secure fl ash drives. Our dedication
, ) I Transport Layer Security
Secure Sockets Layer (SSL, ) I Transport Layer Security _ + (TLS) Network Security Products S31213 UNCLASSIFIED Location of SSL -L Protocols TCP Ethernet IP SSL Header Encrypted SSL data= HTTP " Independent
Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example
Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example Document ID: 113337 Contents Introduction Prerequisites Requirements Components Used Conventions Configuration
Technical Whitepaper. Secure Docs
Technical Whitepaper Secure Docs Contents Introduction 3 Overview 4 Technical Details 4 Conclusion 7 Good Technology 866-7-BE-GOOD www.good.com Secure Docs Technical Whitepaper 2 Introduction As of Q1
Real Vision Imaging. Use a Proxy Server to Connect Your IBM i to the Web. IBM Has Discontinued Service and Support for ALL 3995/3996 Optical Libraries
January 2013 YOUR DOCUMENT MANAGEMENT SOLUTION Real Vision Imaging Use a Proxy Server to Connect Your IBM i to the Web Real Vision Software, Inc. P.O. Box 12958 Alexandria, LA 71315-2958 3700 Jackson Street
MAIL1CLICK API - rel 1.35
hqimawhctmslulpnaq//vkauukqmommgqfedthrmvorodqx6oxyvsummkflyntq/ 2vOreTmgl8JsMty6tpoJ5CjkykDGR9mPg79Ggh1BRdSiqSSQR17oudKwi1pJbAmk MFUkoVTtzGEfEAfOV0Pfi1af+ntJawYxOaxmHZvtyG9iojsQjOrA4S+3i4K4lpj4 A/tj7nrDfL47r2cQ83JszWsQVe2CqTLLQz8saXfGoGJILREPFoF/uPS0sg5TyKYJ
Illustration 1: Diagram of program function and data flow
The contract called for creation of a random access database of plumbing shops within the near perimeter of FIU Engineering school. The database features a rating number from 1-10 to offer a guideline
Configuring Basic Settings
CHAPTER 10 This chapter describes how to configure basic settings on your ASA that are typically required for a functioning configuration. This chapter includes the following sections: Configuring the
Experian Secure Transport Service
Experian Secure Transport Service Secure Transport Overview In an effort to provide higher levels of data protection and standardize our file transfer processes, Experian will be utilizing the Secure Transport
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
Secure Password Managers and Military-Grade Encryption on Smartphones: Oh, Really? Andrey Belenko and Dmitry Sklyarov Elcomsoft Co. Ltd.
Secure Password Managers and Military-Grade Encryption on Smartphones: Oh, Really? Andrey Belenko and Dmitry Sklyarov Elcomsoft Co. Ltd. Securing Data-at-Rest: PC vs Smartphone Threat Model BlackBerry
PCI Data Security. Meeting the Challenges of PCI DSS Payment Card Security
White Paper 0x8c1a3291 0x56de5791 0x450a0ad2 axd8c447ae 8820572 0x5f8a153d 0x19df c2fe97 0xd61b5228 0xf32 4856 0x3fe63453 0xa3bdff82 0x30e571cf 0x36e0045b 0xad22db6a 0x100daa87 0x48df 0x5ef8189b 0x255ba12
End-to-End Enterprise Encryption:
End-to-End Enterprise Encryption: A Look at SecureZIP Technology T E C H N I C A L W H I T E P A P E R WP 700.xxxx Table of Contents SecureZIP Executive Summary SecureZIP: The Next Generation of ZIP PKZIP:
SEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2
SEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2 Table of Contents 1 Introduction...2 2 Procurement of DSC...3 3 Installation of DSC...4 4 Procedure for entering the DSC details of
Implementation Guide. SAS Serial Protocol. for. Montana Department of Justice Gambling Control Division. October 22, 2012. Version 1.4.
Implementation Guide for SAS Serial Protocol Montana Department of Justice Gambling Control Division October 22, 2012 Version 1.4.1 Montana SAS Implementation Guide Page 2 Table of Contents 1 Introduction...
Talk announcement please consider attending!
Talk announcement please consider attending! Where: Maurer School of Law, Room 335 When: Thursday, Feb 5, 12PM 1:30PM Speaker: Rafael Pass, Associate Professor, Cornell University, Topic: Reasoning Cryptographically
NEAR FIELD COMMUNICATION
64 CHAPTER 4 NEAR FIELD COMMUNICATION 4.1. Introduction Near Field Communication (NFC) is a short-range wireless connectivity technology that enables exchange of data between devices and tags over a distance
Deploying PGP Encryption and Compression for z/os Batch Data Protection to (FIPS-140) Compliance
Deploying PGP Encryption and Compression for z/os Batch Data Protection to (FIPS-140) Compliance Patrick Townsend Software Diversified Services/Townsend Security August 9, 2011 Session Number 9347 PGP
Resco Mobile CRM Security
Resco Mobile CRM Security Out-of-the-box Security 1. Overview The Resco Mobile CRM application (client) communicates directly with the Dynamics CRM server. The communication uses standard Dynamic CRM Web
Electronic Mail Security. Email Security. email is one of the most widely used and regarded network services currently message contents are not secure
Electronic Mail Security CSCI 454/554 Email Security email is one of the most widely used and regarded network services currently message contents are not secure may be inspected either in transit or by
PGP from: Cryptography and Network Security
PGP from: Cryptography and Network Security Fifth Edition by William Stallings Lecture slides by Lawrie Brown (*) (*) adjusted by Fabrizio d'amore Electronic Mail Security Despite the refusal of VADM Poindexter
Kaseya US Sales, LLC Virtual System Administrator Cryptographic Module Software Version: 1.0
Kaseya US Sales, LLC Virtual System Administrator Cryptographic Module Software Version: 1.0 FIPS 140-2 Non-Proprietary Security Policy FIPS Security Level: 1 Document Version: 1.0 Prepared for: Prepared
Lecture 4 Data Encryption Standard (DES)
Lecture 4 Data Encryption Standard (DES) 1 Block Ciphers Map n-bit plaintext blocks to n-bit ciphertext blocks (n = block length). For n-bit plaintext and ciphertext blocks and a fixed key, the encryption
NIST Cryptographic Algorithm Validation Program (CAVP) Certifications for Freescale Cryptographic Accelerators
Freescale Semiconductor White Paper Document Number: FSLNISTCAVP Rev. 1.7, 03/2015 NIST Cryptographic Algorithm Validation Program (CAVP) Certifications for Freescale Cryptographic Accelerators This document
PGP - Pretty Good Privacy
I should be able to whisper something in your ear, even if your ear is 1000 miles away, and the government disagrees with that. -- Philip Zimmermann PGP - Pretty Good Privacy - services - message format
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Secret Key Cryptography (I) 1 Introductory Remarks Roadmap Feistel Cipher DES AES Introduction
P and FTP Proxy caching Using a Cisco Cache Engine 550 an
P and FTP Proxy caching Using a Cisco Cache Engine 550 an Table of Contents HTTP and FTP Proxy caching Using a Cisco Cache Engine 550 and a PIX Firewall...1 Introduction...1 Before You Begin...1 Conventions...1
Features Security. File Versioning. Intuitive User Interface. Fast and efficient Backups
IBackup Professional provides a secure, efficient, reliable, cost effective and easy to use Internet based backup solution with additional emphasis on security and data retention. IBackup Professional
Chapter 6 CDMA/802.11i
Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,
Secure Socket Layer (SSL) and Transport Layer Security (TLS)
Secure Socket Layer (SSL) and Transport Layer Security (TLS) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available
z/os Cryptographic Services - ICSF Best Practices
z/os Cryptographic Services - ICSF Best Practices Steven R. Hart, CISSP IBM Thursday, August 7, 2014: 8:30 AM-9:30 AM Session Number 15775 Insert Custom Session QR if Desired. Topics Cryptography Basics
FIPS 140-2 Non-Proprietary Security Policy. IBM Internet Security Systems SiteProtector Cryptographic Module (Version 1.0)
FIPS 140-2 Non-Proprietary Security Policy IBM Internet Security Systems SiteProtector Document Version 2.3 August 5, 2010 Document Version 2.3 IBM Internet Security Systems Page 1 of 24 Prepared For:
FL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE. SFTP (Secure File Transfer Protocol)
FL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE This troubleshooting guide covers secure file transfers using the SFTP file transfer protocols for Claims, POC, and Medical EDI transmissions. SFTP
Table of Contents. Cisco Configuring IPSec Cisco Secure VPN Client to Central Router Controlling Access
Table of Contents Configuring IPSec Cisco Secure VPN Client to Central Router Controlling Access...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...1 Conventions...1 Configure...2
CA Integrated Agent Services
CA Integrated Agent Services Implementation Guide Version 12.0.00 Second Edition This Documentation, which includes embedded help systems and electronically distributed materials (hereinafter referred
