Top Secret Password Hash algorithm method

book

Article ID: 197816

calendar_today

Updated On:

Products

CA Top Secret

Issue/Introduction

Auditor asked how passwords are stored in Top Secret Database.

Which hash algorithm is used?

 

Environment

Release : 16.0

Component : CA Top Secret for z/OS

Resolution

The Top Secret AES algorithm performs thousands of hash operations against the password and random text to generate a key that encrypts the password.

The TSS encryption algorithm uses the CP (central processor) assist for Cryptographic Functions (CPACF) to perform SHA-256 operations.

When the CPACF is not available (older processors such as z900, z800,z990, z890), SHA-256 is performed in software.