× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



Do you own pkzip? Using pkzip with certificates/keys isn't free.

On 4/9/2014 9:17 PM, Jeff Young wrote:
If I wanted to use a digital certificate for the encryption / decryption
keys, what would be needed on the i and what would be needed on the windows
system. I am thinking of using PKZIP for the encryption / decryption.

Jeff Young
Sr. Programmer Analyst


On Wed, Apr 9, 2014 at 1:20 PM, Jeff Young <jyoung0950@xxxxxxxxx> wrote:

Brad,
This is a requirement from the client.
They want to encrypt the file on their side before transmission to prevent
unauthorized access to the data.
I do not know what type of system they are using or what method they use
to place the files on the IFS.

I have requested this information from the client and am waiting for a
response.

Jeff Young
Sr. Programmer Analyst


On Wed, Apr 9, 2014 at 1:10 PM, Bradley Stone <bvstone@xxxxxxxxx> wrote:

Is there a reason that you can't just use SSL or TLS for the transmission
(either over FTP or HTTP)?

Of course, making sure your OpenSSL is patched first. :)

Why add a layer of complexity on both ends when you can have the system do
it for you?

Brad
www.bvstools.com


On Wed, Apr 9, 2014 at 11:15 AM, Charles Wilt <charles.wilt@xxxxxxxxx
wrote:
The API's David pointed out are what you want.

Realize that you'll need to open the file in binary mode and the the
decrypted results will be in ASCII.

Charles


On Wed, Apr 9, 2014 at 12:07 PM, Jeff Young <jyoung0950@xxxxxxxxx>
wrote:
Based on the information I have at this time, they want to just
encrypt
the
data on their system (non ibm i) before transmission to prevent
unauthorized access.
They are sending ascii csv data, so the records and fields with them
are
varying length.

Jeff Young
Sr. Programmer Analyst


On Wed, Apr 9, 2014 at 10:55 AM, <rob@xxxxxxxxx> wrote:

Encrypting the actual data, or the communication?
For example, I could use sftp to transfer files encrypted between
two
systems. That would encrypt the communications but not the actual
data
itself. You could put a sniffer on that comm but you would not be
able
to
make any sense out of that.
Many people use free sftp between disparate entities.

Rob Berendt
--
IBM Certified System Administrator - IBM i 6.1
Group Dekko
Dept 1600
Mail to: 2505 Dekko Drive
Garrett, IN 46738
Ship to: Dock 108
6928N 400E
Kendallville, IN 46755
http://www.dekko.com





From: Jeff Young <jyoung0950@xxxxxxxxx>
To: Midrange Systems Technical Discussion <
midrange-l@xxxxxxxxxxxx
Date: 04/09/2014 10:42 AM
Subject: Encryption methods on the i
Sent by: midrange-l-bounces@xxxxxxxxxxxx



All,
I have a client that is presently sending files from another system
(not
i)
to the IFS in CSV format..
They are planning to encrypt the data prior to transmission and my
program
will need to decrypt it before processing.

What encryption / decryption methods are available on the i to do
this?
At this time, the client has not chosen an encryption method and
they
want
to ensure that the decryption process is available for the i.

At this time, they are not looking for a commercial solution, and I
would
prefer a solution that could be used an ILE RPG program, or a system
command.

TIA,

Jeff Young
Sr. Programmer Analyst
--
This is the Midrange Systems Technical Discussion (MIDRANGE-L)
mailing
list
To post a message email: MIDRANGE-L@xxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo/midrange-l
or email: MIDRANGE-L-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives
at http://archive.midrange.com/midrange-l.


--
This is the Midrange Systems Technical Discussion (MIDRANGE-L)
mailing
list
To post a message email: MIDRANGE-L@xxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo/midrange-l
or email: MIDRANGE-L-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives
at http://archive.midrange.com/midrange-l.


--
This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing
list
To post a message email: MIDRANGE-L@xxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo/midrange-l
or email: MIDRANGE-L-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives
at http://archive.midrange.com/midrange-l.


--
This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing
list
To post a message email: MIDRANGE-L@xxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo/midrange-l
or email: MIDRANGE-L-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives
at http://archive.midrange.com/midrange-l.


--
This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing
list
To post a message email: MIDRANGE-L@xxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo/midrange-l
or email: MIDRANGE-L-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives
at http://archive.midrange.com/midrange-l.




As an Amazon Associate we earn from qualifying purchases.

This thread ...

Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.