z/OS Cryptographic Services ICSF Application Programmer's Guide
Previous topic | Next topic | Contents | Index | Contact z/OS | Library | PDF


Verifying Data Integrity and Authenticating Messages

z/OS Cryptographic Services ICSF Application Programmer's Guide
SA22-7522-16

ICSF provides several methods to verify the integrity of transmitted messages and stored data:

  • Message authentication code (MAC)
  • Hash functions, including modification detection code (MDC) processing and one-way hash generation
Note:
You can also use digital signatures (see Using Digital Signatures) to authenticate messages.

The choice of callable service depends on the security requirements of the environment in which you are operating. If you need to ensure the authenticity of the sender as well as the integrity of the data, and both the sender and receiver can share a secret key, consider message authentication code processing. If you need to ensure the integrity of transmitted data in an environment where it is not possible for the sender and the receiver to share a secret cryptographic key, consider hashing functions, such as the modification detection code process.

The callable services are described in the following topics:

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014