> Current client  driver supports encrypted userid/password (EUSRIDPWD)
> via the use of DH key-agreement protocol - however current Open Group
> DRDA specifications imposes small prime and base generator values
> (256 bits) that prevents other JCE's  (apt from ibm jce) to be used
> as java cryptography providers.

If it's not too much trouble, can you cite chapter and verse here? I find
myself a little surprised that DRDA actually *requires* a short key
length; I would have thought that it might default to a short length, but
would allow longer lengths to be used if the user desired.

I hunted around a bit, and here's what I saw:

  EDTASECOVR, page 324 of V.3:

    The ENCALG parameter indicates the encryption algorithm to use. This
    example assumes that the default DES encryption security algorithm
    is specified. The ENCKEYLEN parameter indicates the encryption key
    length to use. This example assumes that the default 56-bit encryption
    is specified.

  ENCKEYLEN, page 332 of V.3:

    The Encryption Key Length (ENCKEYLEN) specifies the encryption key
    length to be used with ENCALG to encrypt and decrypt the security
    context information. ENCKEYLEN is used by the encryption security
    mechanisms.

Please educate me; I am a rank beginner on this crypto stuff.

thanks,

bryan




Reply via email to