Ibm 990 Manual de usuario Pagina 132

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 284
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 131
120 IBM ^ zSeries 990 Technical Guide
5.1 Cryptographic function support
The z990 includes both standard cryptographic hardware and optional cryptographic features
for flexibility and growth capability. IBM has a long history of providing hardware cryptographic
solutions, from the development of Data Encryption Standard (DES) in the 1970s to delivering
the only integrated cryptographic hardware in a server to achieve the US Government's
highest FIPS 140-2 Level 4 rating for secure cryptographic hardware.
The z990 cryptographic functions include the full range of cryptographic operations needed
for e-business, e-commerce, and financial institution applications. In addition, custom
cryptographic functions can be added to the set of functions that the z990 offers.
Today, e-business applications are increasingly relying on cryptographic techniques to
provide the confidentiality and authentication required in this environment. Secure Sockets
Layer (SSL) technology is a key technology for conducting secure e-commerce using Web
servers, and it is in use by a rapidly increasing number of e-business applications, demanding
new levels of security and performance.
5.1.1 Cryptographic Synchronous functions
For clear key functions only, the hardware includes implementation of the following:
򐂰 Data encryption/decryption algorithms
Data Encryption Standard (DES)
Double length-key DES
Triple length- key DES (TDES)
򐂰 Hashing algorithms SHA-1
򐂰 Message authentication code (MAC):
Single-key MAC
Double-key MAC
5.1.2 Cryptographic Asynchronous functions
For secured key functions, Cryptographic Asynchronous functions process messages that are
passed to it.
򐂰 Data encryption/decryption algorithms
Data Encryption Standard (DES)
Double length-key DES
Triple length- key DES
򐂰 DES key generation and distribution
򐂰 PIN generation, verification, and translation functions
򐂰 Pseudo Random Number (PRN) Generator
򐂰 Public Key Algorithm (PKA) Facility
These commands are intended for application programs using public key algorithms,
including:
Importing RSA public-private key pairs in clear and encrypted forms
Rivest-Shamir-Adelman (RSA)
Vista de pagina 131
1 2 ... 127 128 129 130 131 132 133 134 135 136 137 ... 283 284

Comentarios a estos manuales

Sin comentarios