1 cryptographic function support, 1 cryptographic synchronous functions, 2 cryptographic asynchronous functions – IBM 990 User Manual

Page 132

Advertising
background image

120

IBM

^

zSeries 990 Technical Guide

5.1 Cryptographic function support

The z990 includes both standard cryptographic hardware and optional cryptographic features
for flexibility and growth capability. IBM has a long history of providing hardware cryptographic
solutions, from the development of Data Encryption Standard (DES) in the 1970s to delivering
the only integrated cryptographic hardware in a server to achieve the US Government's
highest FIPS 140-2 Level 4 rating for secure cryptographic hardware.

The z990 cryptographic functions include the full range of cryptographic operations needed
for e-business, e-commerce, and financial institution applications. In addition, custom
cryptographic functions can be added to the set of functions that the z990 offers.

Today, e-business applications are increasingly relying on cryptographic techniques to
provide the confidentiality and authentication required in this environment. Secure Sockets
Layer (SSL) technology is a key technology for conducting secure e-commerce using Web
servers, and it is in use by a rapidly increasing number of e-business applications, demanding
new levels of security and performance.

5.1.1 Cryptographic Synchronous functions

For clear key functions only, the hardware includes implementation of the following:

Data encryption/decryption algorithms

– Data Encryption Standard (DES)

Double length-key DES

Triple length- key DES (TDES)

Hashing algorithms SHA-1

Message authentication code (MAC):

– Single-key MAC

– Double-key MAC

5.1.2 Cryptographic Asynchronous functions

For secured key functions, Cryptographic Asynchronous functions process messages that are
passed to it.

Data encryption/decryption algorithms

– Data Encryption Standard (DES)

– Double length-key DES

– Triple length- key DES

DES key generation and distribution

PIN generation, verification, and translation functions

Pseudo Random Number (PRN) Generator

Public Key Algorithm (PKA) Facility

These commands are intended for application programs using public key algorithms,
including:

– Importing RSA public-private key pairs in clear and encrypted forms

– Rivest-Shamir-Adelman (RSA)

Advertising