SHA-1 (Secure Hash Algorithm) Is Used for Computing a Condensed Representation of a Message

SHA-1 (Secure Hash Algorithm) Is Used for Computing a Condensed Representation of a Message

<p> SHA-1 Verification </p><p>With the new direction using CF cards, and the future of the downloadable platform, (instead of using EPROM’s as the storage media) a new format was needed to secure and verify game programs. The SHA-1 was chosen for this function.</p><p>SHA-1 (Secure Hash Algorithm) is used for computing a condensed representation of a message or a data file. When a message of any length is input, the SHA-1 produces a 160-bit output called a message digest. The message digest can then be used in a signature algorithm or alone to verify the signature for the message or data file.</p><p>Field Service will use SHA-1 as they have been using the Dataman or Kobatron schemes. All serve the same purpose; just SHA-1 is more secure. (A) GLI Verify Program</p><p>Technicians will be given a compact flash card reader and software (GLI version) to perform on-site verification of game software. </p><p>The goal is to use these resources to compare program generated SHA-1 message digest (A), to documented message digest such as par sheet(C). In addition; the software has the ability to document the test for future reference</p><p>(B). (B) Computer log file</p><p>(C) GEN7 Game Description Sheet “PAR” Sheet</p><p>Installing the software</p><p>1. Unzip the CF Verify package to your computer. (Note: Save to your desktop) 2. Double Left click on the “GLI Verify 2.0 Setup” utility, to open the Install Wizard. 3. Follow on screen instructions to complete the installation. (Note: Place icon on your desktop for ease of use). GLI Compact Flash (CF) Card Verification Utility.</p><p>Note: Close all other applications before running this program.</p><p>Procedure</p><p>1) Place the CF card into the Compact Flash Card Reader (USB or PCMIA Adapter). f) Select “OK” 2) Open the GLI Verify program. g) In the Options section, check “Append” 3) When the program opens: h) Use the open folder icon to select an output a) Check the “Directory” radio tab. file b) Check the “Linux Filesystem” radio tab.  If no output file has been created then c) Select the “Browse Directories” button. create new file with a “.log” extension  If hashing System Software or “Set for recording the information off the CF Chip” CF use Partition 2 card for later reference.  If hashing the Game Software use  Select “Yes” if prompted to create a Partition 3 new file d) Click the plus sign to expand e) Select/highlight forward slash “/” 4) Select “Calculate”</p><p>Example of Game Software Hash</p>

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    2 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us