Modernization Hub

Fingerprint

Unique Identifier
Enhanced Definition

In the z/OS context, a "fingerprint" refers to a unique, fixed-size cryptographic hash value generated from a block of data, a file, or a program. Its primary purpose is to provide a concise and verifiable identifier that ensures data integrity, authenticity, or uniqueness, much like a human fingerprint uniquely identifies an individual.

Key Characteristics

    • Uniqueness (Probabilistic): Highly improbable for two different inputs to produce the same hash output, especially with strong algorithms like SHA-256 or SHA-512.
    • Fixed Output Size: Regardless of the input data size (e.g., a small JCL member or a large VSAM KSDS), the hash output (fingerprint) will always be of a predetermined, fixed length.
    • Sensitivity to Input Changes: Even a single bit change in the input data will result in a completely different and unpredictable hash value, making it highly effective for detecting tampering.
    • One-Way Function: Computationally infeasible to reverse the hash to reconstruct the original data, making it suitable for security applications like password storage.
    • Computational Efficiency: Relatively fast to compute for any given input, allowing for efficient integrity checks on large volumes of data.

Use Cases

    • Software Integrity Verification: Comparing the fingerprint of a downloaded z/OS program, utility, or SMP/E PTF against a known, trusted fingerprint to ensure it hasn't been tampered with during distribution or storage.
    • Data Integrity Checking: Generating fingerprints for critical datasets (e.g., VSAM, sequential files), database records (DB2, IMS), or log files to detect unauthorized modifications or corruption over time or during transmission.
    • Digital Signatures: A fingerprint of a document, message, or executable code is encrypted with a private key to create a digital signature, allowing recipients to verify the sender's authenticity and the integrity of the content using the corresponding public key.
    • Password Storage: Storing cryptographic hashes (fingerprints) of user passwords in security databases (like RACF) instead of the passwords themselves, enhancing security by preventing direct exposure of credentials.
    • Unique Record Identification: In some custom applications, a hash of key fields might be used as a lightweight, unique identifier for records, though RBA/LRSN or system-generated IDs are more common for database systems.

Related Concepts

  • Cryptographic Services (ICSF): z/OS leverages the Integrated Cryptographic Service

Related Vendors

Broadcom

235 products

IBM

646 products

Trax Softworks

3 products

Related Categories

CASE/Code Generation

19 products

Operating System

154 products

Browse and Edit

64 products