On Jun 22, 2017, at 6:15 PM, Frank Swarbrick <frank.swarbr...@outlook.com> 
wrote:
> 
> The MD5 is used to verify that the file sent from the mainframe has the same 
> data when received on the interim distributed system.  So creating the MD5 
> after its already there does no good.

I will just add 2 points:

1. If you compute the MD5 hash while the file is still EBCDIC, you will get a 
completely different value than the hash of the ASCII version. Hash algorithms 
work on the binary representation, not the logical meaning.

2. If you’re trying to ensure the data hasn’t been intentionally modified, MD5 
is nearly useless. If you need a hash for detecting malicious corruption, I’d 
use at least SHA2.

-- 
Pew, Curtis G
curtis....@austin.utexas.edu
ITS Systems/Core/Administrative Services


----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to