Order Number:
AA--EY97D--TE
Part Number
Revision/Update Information: This manual supersedes the Encryption for OpenVMS Installation and Reference Manual, Version 1.3
Operating System:
OpenVMS VAX Versions 7.2, 7.3
OpenVMS Alpha Versions 7.2-1, 7.3
Software Version: Encryption for OpenVMS Version 1.6
Compaq Computer Corporation Houston, Texas
© 2001 Compaq Computer Corporation
Compaq, VAX, VMS, POLYCENTER, and the Compaq logo Registered in U.S. Patent and Trademark Office.
OpenVMS is a trademark of Compaq Information Technologies Group, L.P. in the United states and other countries.
All other product names mentioned herein may be trademarks of their respective companies.
Confidential computer software. Valid license from Compaq required for possession, use, or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license.
Compaq shall not be liable for technical or editorial errors or omissions contained herein. The information in this document is provided "as is" without warranty of any kind and is subject to change without notice. The warranties for Compaq products are set forth in the express limited warranty statements accompanying such products. Nothing herein should be construed as constituting an additional warranty.
ZK6477
The Compaq OpenVMS documentation set is available on CD-ROM.
This document was prepared using DECdocument, Version V3.3-1e.
Contents | Index |
The Encryption for OpenVMS product (Encryption) is a standalone layered product that runs on OpenVMS Alpha and OpenVMS VAX systems.
The purpose of this manual is to explain the Encryption for OpenVMS product, show you how to use it, and describe how to write programs with its application programming interface.
This document is for OpenVMS programmers, system managers, and users of this security software.
This manual consists of four chapters and two appendixes.
For additional information about the Encryption for OpenVMS product refer to the Software Product Description (SPD) 26.74.xx.
For additional information about Compaq OpenVMS products and services, access the Compaq website at the following location:
http://www.openvms.compaq.com/ |
This document uses the terms:
Compaq welcomes your comments on this manual. Please send comments to either of the following addresses:
Internet | openvmsdoc@compaq.com |
Compaq Computer Corporation
OSSG Documentation Group, ZKO3-4/U08 110 Spit Brook Rd. Nashua, NH 03062-2698 |
Visit the following World Wide Web address for information about how to order additional documentation:
http://www.openvms.compaq.com/ |
If you need help deciding which documentation best meets your needs, call 800-282-6672.
The following conventions are used in this manual:
Ctrl/ x | A sequence such as Ctrl/ x indicates that you must hold down the key labeled Ctrl while you press another key or a pointing device button. |
PF1
x or
GOLD x |
A sequence such as PF1
x or GOLD
x indicates that you must first press and release the key
labeled PF1 or GOLD and then press and release another key or a
pointing device button.
GOLD key sequences can also have a slash (/), dash (--), or underscore (_) as a delimiter in EVE commands. |
[Return] | In examples, a key name enclosed in a box indicates that you press a key on the keyboard. (In text, a key name is not enclosed in a box.) |
... |
Horizontal ellipsis points in examples indicate one of the following
possibilities:
|
.
. . |
Vertical ellipsis points indicate the omission of items from a code example or command format; the items are omitted because they are not important to the topic being discussed. |
( ) | In command format descriptions, parentheses indicate that, if you choose more than one option, you must enclose the choices in parentheses. |
[ ] | In command format descriptions, brackets indicate optional elements. You can choose one, none, or all of the options. (Brackets are not optional, however, in the syntax of a directory name in an OpenVMS file specification or in the syntax of a substring specification in an assignment statement.) |
{ } | In command format descriptions, braces indicate a required choice of options; you must choose one of the options listed. |
boldface text | Boldface text represents the introduction of a new term or the name of an argument, an attribute, or a reason. |
italic text |
Italic text indicates important information, complete titles of
manuals, or variables.
Variables include information that varies in system output (Internal error number), in command lines (/PRODUCER= name), and in command parameters in text (where device-name contains up to five alphanumeric characters). |
UPPERCASE TEXT | Uppercase text indicates a command, the name of a routine, the name of a file, the name of a node, the name of a user account, or the abbreviation for a system privilege. |
Monospace type |
Monospace type indicates command examples and interactive screen
displays.
In the C programming language, monospace type in text identifies the following elements: keywords, the names of independently compiled external functions and files, syntax summaries, and references to variables or identifiers introduced in an example. |
- | A hyphen at the end of a command format description, command line, or code line indicates that the command or statement continues on the following line. |
numbers | All numbers in text are assumed to be decimal unless otherwise noted. Nondecimal radixes --- binary, octal, or hexadecimal --- are explicitly indicated. |
The OpenVMS operating system provides several data protection schemes.
For example, by using UIC-based protection you can protect data by
controlling access to files. You can use ACLs to refine access control
to specific groups or individual users. For a protection scheme with
yet greater security for your data, you can encrypt the files.
Encrypting a file transforms it into unrecognizable, unintelligible
data, even if someone manages to gain access to it.
1.1 Encryption Process
The process of encryption takes readable data, called plaintext, and uses a mathematical algorithm to transform the plaintext into an unreadable, unintelligible form, called ciphertext.
To encrypt the plaintext data, the encryption operation requires a
key. The key is a variable that controls the
encryption operation. The same plaintext, encrypted with different
keys, results in different ciphertext. In addition, repeated encryption
of the same plaintext with the same key also results in different
ciphertext each time.
1.1.1 DES Encryption Algorithm
The algorithm used by the Encryption for OpenVMS product is a software implementation of the Data Encryption Standard (DES) defined by the National Bureau of Standards (NBS). The NBS document FIPS-PUB-46 describes the operation of the DES algorithm in detail.
Because the DES algorithm is public knowledge, the security of your
ciphertext files depends on the keys you define.
1.1.2 Keys
The Encryption for OpenVMS implementation uses two keys:
The key you provide encrypts the data key, which is stored in the first block of the ciphertext file. The process uses the encrypted data key to encrypt the file. You have the option to encrypt either the data key or the file. Table 1-1 shows the components of the encryption process.
Input | Algorithm | Output |
---|---|---|
User-supplied data key | Key encryption | Encrypted key |
Data (plaintext) and
the encrypted data key |
Data encryption | Encrypted file |
Figure 1-1 illustrates the data encryption operation. In this example, the input file contains the text "secret" and the key has been defined as "elmno jflghi." The output file is unreadable text.
Figure 1-1 Encrypting a File
To gain access to the data in an encrypted file, reverse the encryption process by performing the decryption process. Decryption uses a mathematical encryption algorithm to change ciphertext into the original plaintext.
Before decrypting a file, the software checks the validity of the key you provide. This validation is a checksum operation on the encrypted data stored in the first block of the ciphertext file.
When you specify the DES algorithm to decrypt a file, use the key that is identical to the one used in the original encryption process.
Only the correct key can decrypt your file. If you lose or forget the key, you cannot gain access to the data in any understandable, useful form. |
Figure 1-2 shows the data decryption operation. In this example, the input file holds unreadable text. The key, "elmno jflghi," is the same key that was used to encrypt this file. The output file contains the readable text "secret."
Figure 1-2 Decrypting a File
The Encryption for OpenVMS software detects any modification made to both plaintext and ciphertext files. This process is called authentication. Authentication checks for and reports on any changes to:
The software calculates two Message Authentication Codes (MACs): one based on file contents and one based on security settings. The software then associates them with one or more files and stores this information. When you subsequently check file integrity, the software recalculates the MACs and compares them against the stored codes.
For information about how to authenticate files, see Section 3.3.
1.3 Encryption Interfaces
To define and delete keys and to encrypt and decrypt files, use the following Encryption interfaces:
The Encryption for OpenVMS software includes full backward compatibility with previous releases of the product.
In addition, encrypted files are fully compatible between OpenVMS systems. You can copy them from system to system and do all remote file operations that OpenVMS systems support for other kinds of files. In addition, you can encrypt files on one system and decrypt them on another system that also runs the Encryption software.
Inter-system encryption operations with non-OpenVMS platforms are not supported.
The Encryption for OpenVMS layered product uses the POLYCENTER Software Installation procedure.
For CD kits, the POLYCENTER Software Installation procedure
automatically identifies and installs the distribution kit that is
appropriate to your platform --- either an OpenVMS Alpha or OpenVMS VAX
system.
2.1 Requirements
Before you start the procedure, ensure that you meet the following installation requirements:
For complete information about hardware and software requirements,
see the SPD.
2.2 Before You Run the Installation Procedure
Before you start the installation, complete the following
pre-installation tasks.
2.2.1 De-Installing Previous Versions
Compaq recommends that you de-install previous versions of Encryption
for OpenVMS before you install Version 1.6. See Section 2.5 for
de-installation information.
2.2.2 Pre-Installation: Installing onto OpenVMS VAX Systems
If you are installing the kit onto an OpenVMS VAX system, follow these steps:
$ PRODUCT SHOW PRODUCT VMS |
$ PRODUCT REGISTER PRODUCT VMS /SOURCE=SYS$UPDATE: |
Before you install onto a newly licensed node or cluster, register the Product Authorization Key (License PAK). Use the License Management facility (LMF). If you are installing Encryption for OpenVMS Version 1.6 as an update onto a node or cluster already licensed for this software, you have already completed the License PAK registration requirements.
Your PAK might be shipped along with the kit if you ordered the license and media together. Otherwise, it is shipped separately to a location based on your license order.
To register a license, follow these steps:
For complete information about LMF, see the OpenVMS License Management Utility Manual.
The POLYCENTER Software Installation procedure automatically calls the
Installation Verification Procedure (IVP). The availability of a valid
license is checked. If your Encryption license is registered, the
procedure runs the IVP. If your license is not registered, you receive
a message showing that the installation is complete, but verification
cannot be performed.
2.2.3.1 Installing After You Load the License PAK
When you register your PAK before starting the installation, the IVP might display these messages during the installation procedure:
% Verification of installation starting |
Displayed when IVP is run.
% Successful verification of installation |
Displayed when the IVP is run without any errors.
2.2.3.2 Installing Before You Load the License PAK
If you install the Encryption software before registering your PAK, the IVP might display these messages during the installation procedure:
% Installation complete, but verification cannot be run because license for ENCRYPTION is not available |
A valid license is not loaded.
% Installation complete, but verification cannot be run because test data files are not in SYS$COMMON:[SYSTEST.ENCRYPTION] |
You set the destination for the installed files to a device other than SYS$COMMON.
% Verification of installation failed |
The IVP cannot successfully complete.
2.2.4 Disk onto Which You Install
Compaq strongly suggests that you install the software onto the system disk SYS$COMMON:. If you use a different device, neither the IVP nor the Encryption software can run until you complete these additional steps:
The Encryption for OpenVMS CD kits support both OpenVMS Alpha systems
and OpenVMS VAX systems (see Section 2.3.1).
2.3.1 Installation Procedure
To start the procedure, follow these steps:
$ MOUNT /SYSTEM DKA400: volume-label %MOUNT-I-WRITELOCK, volume is write locked %MOUNT-I-MOUNTED, volume-label mounted on _SPRING$DKA400: |
$ DIRECTORY DKA400:[ENCRYPT0106...] Directory DKA400:[ENCRYPT0106] DOCUMENTATION.DIR;1 KIT.DIR;1 Total of 2 files. Directory DKA400:[ENCRYPT0106.DOCUMENTATION] CPQ-VMS-ENCRYPT-V0106_RELEASE_NOTES.TXT;1 CPQ-VMS-ENCRYPT-V0106_RELEASE_NOTES.PS;1 CPQ-VMS-ENCRYPT-V0106_SPD.PS;1 CPQ-VMS-ENCRYPT-V0106_SPD.TXT;1 CPQ-VMS-ENCRYPT-V0106_COVER_LETTER.TXT;1 CPQ-VMS-ENCRYPT-V0106_COVER_LETTER.PS;1 Total of 6 files. Directory DKA400:[ENCRYPT0106.KIT] CPQ-AXPVMS-ENCRYPT-V0106--1.PCSI;1 CPQ-VAXVMS-ENCRYPT-V0106--1.PCSI;1 Total of 2 files. Grand total of 3 directories, 10 files. |
$ TYPE /PAGE - _$ DKA400:[ENCRYPT0106.DOCUMENTATION]CPQ-VMS-ENCRYPT-V0106.RELEASE_NOTES |
$ PRINT /QUEUE=PRINTER_7 - _$ DKA400:[ENCRYPT0106.DOCUMENTATION]DEC-VMS-ENCRYPT-V0106_RELEASE_NOTES.PS |
$ PRODUCT INSTALL ENCRYPT /SOURCE=DKA400:ENCRYPT0106 |
$ PRODUCT INSTALL ENCRYPT /SOURCE=DKA400:[ENCRYPT0106.KIT] The following product has been selected: CPQ AXPVMS ENCRYPT V1.6 Layered Product Do you want to continue? [YES]) [Return] Configuration phase starting ... You will be asked to choose options, if any, for each selected product and for any products that may be installed to satisfy software dependency requirements. CPQ AXPVMS ENCRYPT V1.6: Compaq Encryption for OpenVMS Alpha (c) Compaq Computer Corporation 2001. All rights reserved. Do you want the defaults for all options? [YES]) [Return] Do you want to review the options? [NO] [Return] Execution phase starting ... The following product will be installed to destination: CPQ AXPVMS ENCRYPT V1.6 DISK$ALPHA:[VMS$COMMON.] Portion done: 0%...10%...20%...30%...40%...50%...60%...70%...80%...90%...100% The following product has been installed: CPQ AXPVMS ENCRYPT V1.6 Layered Product CPQ AXPVMS ENCRYPT V1.6: Compaq Encryption for OpenVMS Alpha @ SYS$STARTUP:ENCRYPT_START.COM required in system startup Note: Upgrading OpenVMS requires Encryption product reinstallation Refer to SYS$HELP: CPQ-VMS-ENCYRPT-V0106.RELEASE.NOTES for more information. |
PRODUCT LIST ENCRYPT/SOURCE=[pcsi kit location] |
Next | Contents | Index |