z/OS Cryptographic Services ICSF Application Programmer's Guide
Previous topic | Next topic | Contents | Index | Contact z/OS | Library | PDF


Managing Data Integrity and Message Authentication

z/OS Cryptographic Services ICSF Application Programmer's Guide
SA22-7522-16

To ensure the integrity of transmitted messages and stored data, ICSF provides:

  • Message authentication code (MAC)
  • Several hashing functions, including modification detection code (MDC), SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-160 and MD5.

(See Using Digital Signatures for an alternate method of message authentication using digital signatures.)

The choice of callable service depends on the security requirements of the environment in which you are operating. If you need to ensure the authenticity of the sender and also the integrity of the data, consider message authentication code processing. If you need to ensure the integrity of transmitted data in an environment where it is not possible for the sender and the receiver to share a secret cryptographic key, consider hashing functions, such as the modification detection code process.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014