PKZIP /Securezip™ for Iseries

PKZIP /Securezip™ for Iseries

PKZIP®/SecureZIP™ for iSeries User’s Guide SZIU-V8R2000 PKWARE Inc. PKWARE Inc. 648 N Plankinton Avenue, Suite 220 Milwaukee, WI 53203 Sales: 937-847-2374 Sales - Email: [email protected] Support: 937-847-2687 Support - http://www.pkware.com/business_and_developers/support Fax: 414-289-9789 Web Site: http://www.pkware.com 8.2 Edition (2005) SecureZIP™ for iSeries, PKZIP® for iSeries, PKZIP for MVS, SecureZIP for zSeries, PKZIP for zSeries, PKZIP for OS/400, PKZIP for UNIX, and PKZIP for Windows are just a few of the many members in the PKZIP® family. PKWARE, Inc. would like to thank all the individuals and companies -- including our customers, resellers, distributors, and technology partners -- who have helped make PKZIP the industry standard for trusted ZIP solutions. PKZIP enables our customers to efficiently and securely transmit and store information across systems of all sizes, ranging from desktops to mainframes. This edition applies to the following PKWARE, Inc. licensed programs: PKZIP for iSeries (Version 8, Release 2, 2005) SecureZIP for iSeries (Version 8, Release 2, 2005) SecureZIP for iSeries Reader (Version 8, Release 2, 2005) SecureZIP for iSeries SecureLink (Version 8, Release 2, 2005) PKZIP is a registered trademark of PKWARE Inc. SecureZIP is a trademark of PKWARE Inc. Other product names mentioned in this manual may be a trademark or registered trademarks of their respective companies and are hereby acknowledged. Any reference to licensed programs or other material, belonging to any company, is not intended to state or imply that such programs or material are available or may be used. The copyright in this work is owned by PKWARE, Inc., and the document is issued in confidence for the purpose only for which it is supplied. It must not be reproduced in whole or in part or used for tendering purposes except under an agreement or with the consent in writing of PKWARE, Inc., and then only on condition that this notice is included in any such reproduction. No information as to the contents or subject matter of this document or any part thereof either directly or indirectly arising there from shall be given or communicated in any manner whatsoever to a third party being an individual firm or company or any employee thereof without the prior consent in writing of PKWARE, Inc. Copyright © 1989 - 2005 PKWARE, Inc. All rights reserved. Contents PREFACE............................................................................................................. 1 About this Manual...................................................................................................... 1 Conventions Used in this Manual ............................................................................ 2 Related Publications.................................................................................................. 2 Related IBM Publications .......................................................................................... 3 Related Information on the Internet ......................................................................... 3 Release Summary ...................................................................................................... 4 New Products ........................................................................................................... 4 New Features ........................................................................................................... 4 New Commands....................................................................................................... 5 Command Changes & Defaults................................................................................ 5 Migration Considerations for Version 8.2 ................................................................. 5 User Help and Contact Information.......................................................................... 6 1 GETTING STARTED ...................................................................................... 7 PKZIP and PKUNZIP Commands.............................................................................. 7 Basic Features of PKZIPi ........................................................................................... 7 Initializing the License............................................................................................... 8 Evaluation Period ..................................................................................................... 8 Release Licensing .................................................................................................... 8 Show System Information ........................................................................................ 9 Applying a License Key or Authorization Code ........................................................ 9 Reporting the PKZIPi for iSeries License ............................................................... 11 PKZIP and SecureZIP for iSeries Grace Period .................................................... 11 Invoking PKZIPi Services ........................................................................................ 12 PKZIPi Differences from other Platforms .............................................................. 12 Use of SAVF Method................................................................................................ 13 Data Compression ................................................................................................... 13 ZIP Archives ............................................................................................................. 14 Cyclic Redundancy Check ...................................................................................... 15 iii Encryption ................................................................................................................ 15 File Selection and Name Processing ..................................................................... 15 Primary File Selection Inputs.................................................................................. 16 File Exclusion Inputs............................................................................................... 18 Input ZIP Archive Files ........................................................................................... 18 SPOOL File Selecting ............................................................................................ 18 Large Files Considerations..................................................................................... 18 Large File Support Summary ................................................................................. 18 Large File Support File Capacities ......................................................................... 19 Cross Platform Compatibility ................................................................................. 20 ZIP File Format Specification.................................................................................. 21 PKZIP/SecureZIP for iSeries Restrictions ............................................................. 21 2 INTRODUCTION TO DATA SECURITY....................................................... 23 Encryption ................................................................................................................ 23 Authentication .......................................................................................................... 24 Data Integrity .......................................................................................................... 24 Digital Signature Validation .................................................................................... 24 Digital Signature Source Validation........................................................................ 25 Public-Key Infrastructure and Digital Certificates................................................ 25 Public-Key Infrastructure (PKI)............................................................................... 25 X.509 ...................................................................................................................... 26 Digital Certificates................................................................................................... 26 Certificate Authority (CA)........................................................................................ 26 Private Key ............................................................................................................. 26 Public Key............................................................................................................... 27 Certificate Authority and Root Certificates ............................................................. 27 Types of Encryption Algorithms ............................................................................ 27 FIPS 46-3, Data Encryption Standard (DES) ......................................................... 27 Triple DES Algorithm (3DES) ................................................................................. 27 Advanced Encryption Standard (AES) ................................................................... 28 Comparison of the 3DES and AES Algorithms ...................................................... 28 RC4 ........................................................................................................................ 29 Key Management...................................................................................................... 29 Passwords and PINS ..............................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    213 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us