SHA-1 (Secure Hash Algorithm) Is Used for Computing a Condensed Representation of a Message

Total Page:16

File Type:pdf, Size:1020Kb

SHA-1 (Secure Hash Algorithm) Is Used for Computing a Condensed Representation of a Message

SHA-1 Verification

With the new direction using CF cards, and the future of the downloadable platform, (instead of using EPROM’s as the storage media) a new format was needed to secure and verify game programs. The SHA-1 was chosen for this function.

SHA-1 (Secure Hash Algorithm) is used for computing a condensed representation of a message or a data file. When a message of any length is input, the SHA-1 produces a 160-bit output called a message digest. The message digest can then be used in a signature algorithm or alone to verify the signature for the message or data file.

Field Service will use SHA-1 as they have been using the Dataman or Kobatron schemes. All serve the same purpose; just SHA-1 is more secure. (A) GLI Verify Program

Technicians will be given a compact flash card reader and software (GLI version) to perform on-site verification of game software.

The goal is to use these resources to compare program generated SHA-1 message digest (A), to documented message digest such as par sheet(C). In addition; the software has the ability to document the test for future reference

(B). (B) Computer log file

(C) GEN7 Game Description Sheet “PAR” Sheet

Installing the software

1. Unzip the CF Verify package to your computer. (Note: Save to your desktop) 2. Double Left click on the “GLI Verify 2.0 Setup” utility, to open the Install Wizard. 3. Follow on screen instructions to complete the installation. (Note: Place icon on your desktop for ease of use). GLI Compact Flash (CF) Card Verification Utility.

Note: Close all other applications before running this program.

Procedure

1) Place the CF card into the Compact Flash Card Reader (USB or PCMIA Adapter). f) Select “OK” 2) Open the GLI Verify program. g) In the Options section, check “Append” 3) When the program opens: h) Use the open folder icon to select an output a) Check the “Directory” radio tab. file b) Check the “Linux Filesystem” radio tab.  If no output file has been created then c) Select the “Browse Directories” button. create new file with a “.log” extension  If hashing System Software or “Set for recording the information off the CF Chip” CF use Partition 2 card for later reference.  If hashing the Game Software use  Select “Yes” if prompted to create a Partition 3 new file d) Click the plus sign to expand e) Select/highlight forward slash “/” 4) Select “Calculate”

Example of Game Software Hash

Recommended publications