Chapter 6. Cryptography
213
6.5.1 Cryptographic asynchronous functions
The optional PCIe cryptographic coprocessor Crypto Express5S provides asynchronous
cryptographic functions to z13s servers. Over 300 cryptographic algorithms and modes are
supported, including the following:
DES/TDES w DES/TDES MAC/CMAC: The Data Encryption Standard is a widespread
symmetrical encryption algorithm. DES and TDES are no longer considered sufficiently
secure for many applications. They have been replaced by AES as the official US
standard, but are still used in the industry, together with MAC and the Cipher Based
Message Authentication Code (CMAC) for verifying the integrity of messages.
AES, AESKW, AES GMAC, AES GCM, AES XTS mode, CMAC: AES replaced DES as
the official US standard in October 2000. Also, the enhanced standards for AES Key Warp
(AESKW), the AES Galois Message Authentication Code (AES GMAC) and
Galois/Counter Mode (AES GCM), as well as the XEX-based tweaked-codebook mode
with ciphertext stealing (AES XTS) and CMAC are supported.
MD5, SHA-1, SHA-2 (224, 256, 384, 512), HMAC: The Secure Hash Algorithm (SHA-1
and the enhanced SHA-2 for different block sizes) as well as the older message-digest
(MD5) algorithm and the advanced Hash-Based Message Authentication Code (HMAC)
are used for verifying both the data integrity and the authentication of a message.
Visa Format Preserving Encryption (VFPE): A method of encryption where the resulting
cipher text has the same form as the input clear text, developed for use with credit cards.
RSA (512, 1024, 2048, 4096): RSA has been published in 1977 and was named with the
initial letters of the surnames of its authors Ron Rivest, Adi Shamir, and Leonard Adleman.
It is a widely used asymmetric public-key algorithm, which means that the encryption key
is public while the decryption key is kept secret. It is based on the difficulty of factoring the
product of two large prime numbers. The number describes the length of the keys.
ECDSA (192, 224, 256, 384, 521 Prime/NIST): Elliptic Curve Cryptography (ECC) is a
family of asymmetric cryptographic algorithms based on the algebraic structure of elliptic
curves. ECC can be used for encryption, pseudo-random number generation, and digital
certificates. The Elliptic Curve Digital Signature Algorithm (ECDSA) Prime/NIST method is
used for ECC digital signatures that are recommended for government use by the National
Institute of Standards and Technology (NIST).
ECDSA (160, 192, 224, 256, 320, 384, 512 BrainPool): ECC Brainpool is a workgroup of
companies and institutions that collaborate on developing ECC algorithms. The ECDSA
algorithms that are recommended by this group are supported.
ECDH (192, 224, 256, 384, 521 Prime/NIST): Elliptic Curve Diffie-Hellman (ECDH) is an
asymmetric protocol used for key agreement between two parties that use ECC-based
private keys. The recommendations by NIST are supported.
ECDH (160, 192, 224, 256, 320, 384, 512 BrainPool): ECDH according to the Brainpool
recommendations.
Montgomery Modular Math Engine: The Montgomery Modular Math Engine is a method
for fast modular multiplication. Many crypto systems like RSA and Diffie-Hellman key
Exchange use this method.
Random Number Generator (RNG): The generation of random numbers for cryptographic
key generation is supported.
Prime Number Generator (PNG): The generation of prime numbers is supported.
Clear Key Fast Path (Symmetric and Asymmetric): This mode of operations gives a direct
hardware path to the cryptographic engine and provides high performance for public-key
cryptographic functions.
Содержание z13s
Страница 2: ......
Страница 3: ...International Technical Support Organization IBM z13s Technical Guide June 2016 SG24 8294 00 ...
Страница 24: ...THIS PAGE INTENTIONALLY LEFT BLANK ...
Страница 164: ...136 IBM z13s Technical Guide ...
Страница 226: ...198 IBM z13s Technical Guide ...
Страница 256: ...228 IBM z13s Technical Guide ...
Страница 414: ...386 IBM z13s Technical Guide ...
Страница 464: ...436 IBM z13s Technical Guide ...
Страница 476: ...448 IBM z13s Technical Guide ...
Страница 498: ...470 IBM z13s Technical Guide ...
Страница 502: ...474 IBM z13s Technical Guide ...
Страница 568: ...540 IBM z13s Technical Guide ...
Страница 578: ...550 IBM z13s Technical Guide ...
Страница 584: ...556 IBM z13s Technical Guide ...
Страница 585: ...ISBN 0738441678 SG24 8294 00 1 0 spine 0 875 1 498 460 788 pages IBM z13s Technical Guide ...
Страница 586: ......
Страница 587: ......
Страница 588: ...ibm com redbooks Printed in U S A Back cover ISBN 0738441678 SG24 8294 00 ...