Cargando…

System z Crypto and TKE update /

This IBM℗ʼ Redbooks℗ʼ publication provides detailed information about the implementation of hardware cryptography in the System z10℗ʼ server. We begin by summarizing the history of hardware cryptography on IBM Mainframe servers, introducing the cryptographic support available on the IBM System z10,...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: International Business Machines Corporation. International Technical Support Organization
Otros Autores: Singh, Karan
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Poughkeepsie, N.Y.?] : IBM, International Technical Support Organization, ©2011.
Colección:IBM redbooks.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ia 4500
001 OR_ocn748597931
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 110831s2011 nyua ob 001 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d COO  |d OCLCQ  |d DEBSZ  |d OCLCA  |d OCLCF  |d VT2  |d OCLCQ  |d OCLCA  |d OCLCQ  |d OCLCA  |d CEF  |d OCLCA  |d WYU  |d OCLCO  |d ORMDA  |d OCLCQ  |d OCLCO 
019 |a 803523388  |a 1351505011 
020 |a 0738435546 
020 |a 9780738435541 
020 |z 9780738435541 
029 1 |a DEBSZ  |b 368461874 
029 1 |a GBVCP  |b 785432760 
035 |a (OCoLC)748597931  |z (OCoLC)803523388  |z (OCoLC)1351505011 
037 |a CL0500000108  |b Safari Books Online 
037 |a 0738435546  |b O'Reilly Media 
050 4 |a QA76.8.I1015  |b S97 2011 
082 0 4 |a 004.09  |2 23/eng/20221122 
049 |a UAMI 
245 0 0 |a System z Crypto and TKE update /  |c by Karan Singh [and others]. 
246 3 |a System z Crypto and Trusted Key Entry update 
260 |a [Poughkeepsie, N.Y.?] :  |b IBM, International Technical Support Organization,  |c ©2011. 
300 |a 1 online resource (xiv, 308 pages) :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a IBM redbooks 
504 |a Includes bibliographical references and index. 
520 |a This IBM℗ʼ Redbooks℗ʼ publication provides detailed information about the implementation of hardware cryptography in the System z10℗ʼ server. We begin by summarizing the history of hardware cryptography on IBM Mainframe servers, introducing the cryptographic support available on the IBM System z10, introducing the Crypto Express3 feature, briefly comparing the functions provided by the hardware and software, and providing a high-level overview of the application programming interfaces available for invoking cryptographic support. This book then provides detailed information about the Crypto Express3 feature, discussing at length its physical design, its function and usage details, the services that it provides, and the API exposed to the programmer. This book also provides significant coverage of the CP Assist for Cryptographic Functions (CPACF). Details on the history and purpose of the CPACF are provided, along with an overview of cryptographic keys and CPACF usage details. A chapter on the configuration of the hardware cryptographic features is provided, which covers topics such as zeroizing domains and security settings. We examine the software support for the cryptographic functions available on the System z10 server. We look at the recent changes in the Integrated Cryptographic Service Facility (ICSF) introduced with level HCR7770 for the z/OS℗ʼ operating system. A discussion of PKCS#11 support presents an overview of the standard and provides details on configuration and exploitation of PKCS#11 services available on the z/OS operating system. The Trusted Key Entry (TKE) Version 6.0 workstation updates are examined in detail and examples are presented on the configuration, usage, and exploitation of the new features. We discuss the cryptographic support available for Linux℗ʼ on System z℗ʼ, with a focus on the services available through the IBM Common Cryptographic Architecture (CCA) API. We also provide an overview on Elliptical Curve Cryptography (ECC), along with examples of exploiting ECC using ICSF PKCS#11 services. Sample Rexx and Assembler code is provided that demonstrate the capabilities of CPACF protected keys. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a IBM computers  |x Programming. 
650 0 |a Computer security. 
650 0 |a Cryptography. 
650 0 |a Client/server computing. 
650 2 |a Computer Security 
650 6 |a IBM (Ordinateurs)  |x Programmation. 
650 6 |a Sécurité informatique. 
650 6 |a Cryptographie. 
650 6 |a Architecture client-serveur (Informatique) 
650 7 |a Client/server computing  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Cryptography  |2 fast 
650 7 |a IBM computers  |x Programming  |2 fast 
700 1 |a Singh, Karan. 
710 2 |a International Business Machines Corporation.  |b International Technical Support Organization. 
776 0 8 |i Print version:  |t System z crypto and TKE update.  |d Poughkeepsie, N.Y. : IBM Corporation, International Technical Support Organization, ©2011  |z 9780738435541 
830 0 |a IBM redbooks. 
856 4 0 |u https://learning.oreilly.com/library/view/~/0738435546/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP