On 2017-06-23, at 06:48, Pew, Curtis G wrote: > On Jun 22, 2017, at 6:15 PM, Frank Swarbrick wrote: >> >> The MD5 is used to verify that the file sent from the mainframe has the same >> data when received on the interim distributed system. So creating the MD5 >> after its already there does no good. > > I will just add 2 points: > > 1. If you compute the MD5 hash while the file is still EBCDIC, you will get a > completely different value than the hash of the ASCII version. Hash > algorithms work on the binary representation, not the logical meaning. > Yes.
> 2. If you’re trying to ensure the data hasn’t been intentionally modified, > MD5 is nearly useless. If you need a hash for detecting malicious corruption, > I’d use at least SHA2. > Maybe. I have yet to hear of a general preimage attack on MD5; only cleverly crafted collisions: https://en.wikipedia.org/wiki/Preimage_attack But, exercise an abundance of caution. Are there any prepackaged utilities that will use ICSF to: o encrypt/decrypt a UNIX file o generate/validate a hash of a UNIX file ... without resorting to an Assembler (or other language) programming interface? When I recommended SuperC over checksum, I neglected that there are numerous Compare Type and process options that affect the strength of the comparison. I don't know which give the strictest comparison. -- gil ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN