|
If you are dealing with security problems relating to this sort of thing, I suggest you try the book "Modern Cryptography" by Meyer and Matyas, available in any decent technical library. I believe that somewhere, it covers topics like this. Certainly, the discussions on key management will be very relevant to your question. It's a fairly old book now, but still readable and for my money, clear and useful in a field where one's intuition often fails. When it comes to this sort of thing, it is easy to implement things that _look_ good, but are really very weak (ie, you don't preserve whatever secrets you think you're preserving even though a lot of scrambled up looking data is flowing around). You may well find, for instance, that a cryptographically random _seed_ is insufficient if that seed is then fed into a standard pseudorandom number generator. Abusing pseudo random number generators for cryptographic use is well known to be a problem to those who know how to hack ciphers, but is surprisingly unknown to the general programmers whose exposure to security is intermittent and only a small part of a larger job. If that's what you intend; don't do it. If you need to secure data, you may need to use a decent cryptography system to really secure the data you're trying to secure, because many non-cryptographic programmable "random number generators" are totally insecure against 50 year old cryptography methods. Some can even be cracked with ordinary paper and pencil! The old Data Encryption Standard has a mode which works in the role you may be thinking of here and it is very random and also cryptographically strong. Please note, also, that if you are trying to secure some data this way, the general security of the AS/400 is presumably irrelevant. That is, if you are sure that AS/400 can keep the data from flowing to those without proper access via the regular AS/400 security, you don't need any kind of cryptography with our without a pseudo random number generator. On the other hand, if the data is, say, flowing outside of the '400 on the general Internet, or is otherwise in a *PUBLIC file or something, then your security is entirely dependent on the quality of the method you use to encrypt the data. Larry W. Loen (lwloen@rchland.vnet.ibm.com) Department HP4 IBM Rochester, Minnesota (507)253-3535 t/l 553-3535 +--- | This is the JAVA/400 Mailing List! | To submit a new message, send your mail to JAVA400-L@midrange.com. | To subscribe to this list send email to JAVA400-L-SUB@midrange.com. | To unsubscribe from this list send email to JAVA400-L-UNSUB@midrange.com. | Questions should be directed to the list owner: joe@zappie.net +---
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.