ibm-information-center/dist/eclipse/plugins/i5OS.ic.rzajc_5.4.0.1/rzajcoverview.htm

104 lines
6.6 KiB
HTML
Raw Normal View History

2024-04-02 14:02:31 +00:00
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en-us" xml:lang="en-us">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="security" content="public" />
<meta name="Robots" content="index,follow" />
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
<meta name="DC.Type" content="concept" />
<meta name="DC.Title" content="Cryptography" />
<meta name="abstract" content="IBM offers cryptography solutions for customers who require a high level of security." />
<meta name="description" content="IBM offers cryptography solutions for customers who require a high level of security." />
<meta name="DC.Relation" scheme="URI" content="rzajcwhatsnew.htm" />
<meta name="DC.Relation" scheme="URI" content="rzajcprintme.htm" />
<meta name="DC.Relation" scheme="URI" content="rzajcconcepts.htm" />
<meta name="DC.Relation" scheme="URI" content="rzajcco4758.htm" />
<meta name="DC.Relation" scheme="URI" content="rzajctroubleshooting.htm" />
<meta name="DC.Relation" scheme="URI" content="rzajcaccel2058.htm" />
<meta name="DC.Relation" scheme="URI" content="rzajcrelativeinfo.htm" />
<meta name="copyright" content="(C) Copyright IBM Corporation 2006" />
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 2006" />
<meta name="DC.Format" content="XHTML" />
<meta name="DC.Identifier" content="overview" />
<meta name="DC.Language" content="en-us" />
<!-- All rights reserved. Licensed Materials Property of IBM -->
<!-- US Government Users Restricted Rights -->
<!-- Use, duplication or disclosure restricted by -->
<!-- GSA ADP Schedule Contract with IBM Corp. -->
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
<link rel="stylesheet" type="text/css" href="./ic.css" />
<title>Cryptography</title>
</head>
<body id="overview"><a name="overview"><!-- --></a>
<img src="./delta.gif" alt="Start of change" /><!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
<h1 class="topictitle1">Cryptography</h1>
<div><p> IBM<sup>®</sup> offers
cryptography solutions for customers who require a high level of security.</p>
<p>A comprehensive cryptography solution is an important part of a successful
security strategy. IBM offers a family of cryptographic hardware options
for protecting data and for securing transaction processing, as well as a
set of cryptographic services APIs that customers can use to customize their
programs.</p>
<p>You can make cryptography an integral part of your security solution by
installing cryptographic hardware in your system. To ensure that you understand
how cryptographic hardware works and how you can implement it in your system,
review these topics:</p>
<div class="note"><span class="notetitle">Note:</span> This information includes programming examples. Read the <a href="codedisclaimer.htm#codedisclaimer">Code license and disclaimer information</a> for
important legal information.</div>
<div class="p"><ul><li>Whats new for V5R4 highlights the new features or functions available
for this release of the system.</li>
<li>Printable PDF provides a link to the PDF version of this information and
explains the printing options that are available to you.</li>
<li>Cryptography concepts provides a basic understanding of cryptographic
functions, as well as an overview of the system's cryptographic services.</li>
<li>Cryptographic hardware:<ul><li>Cryptographic hardware concepts explain some basic concepts regarding
the cryptographic hardware available for your system, enabling you to better
understand how to maximize your usage of cryptography and cryptographic hardware
options with your server.</li>
</ul>
</li>
<li>Usage scenarios offer some example configurations or uses of cryptographic
hardware:<ul><li>Cryptographic hardware scenario: Protect private keys with cryptographic
hardware</li>
<li>Cryptographic hardware scenario: Write an i5/OS™ application to use the IBM Cryptographic
Coprocessors</li>
</ul>
</li>
<li>Choosing the best cryptographic hardware for your server:<ul><li>Cryptographic Coprocessors includes planning and configuration information
for the IBM 4764
and 4758 Cryptographic Coprocessors.</li>
<li>2058 Cryptographic Accelerator includes planning and configuration information
for the 2058 Cryptographic Accelerator.</li>
</ul>
</li>
<li>Related information points to other sources of cryptographic information,
as well as related product information sites.</li>
</ul>
</div>
</div>
<div>
<ul class="ullinks">
<li class="ulchildlink"><strong><a href="rzajcwhatsnew.htm">What's new for V5R4</a></strong><br />
If you are looking for the latest information regarding new cryptographic software and hardware, and added features to the existing cryptographic hardware options, you have come to the right place.</li>
<li class="ulchildlink"><strong><a href="rzajcprintme.htm">Printable PDF</a></strong><br />
Use this to view and print a PDF of this information.</li>
<li class="ulchildlink"><strong><a href="rzajcconcepts.htm">Cryptography concepts</a></strong><br />
This article provides a basic understanding of cryptographic function and an overview of the server's cryptographic services</li>
<li class="ulchildlink"><strong><a href="rzajcco4758.htm">4764 and 4758 Cryptographic Coprocessors</a></strong><br />
IBM offers
two Cryptographic Coprocessors, which are available on a variety of server
models.</li>
<li class="ulchildlink"><strong><a href="rzajctroubleshooting.htm">Troubleshoot the Cryptographic Coprocessor</a></strong><br />
Use these troubleshooting methods to tackle some of the basic problems that may occur with your Cryptographic Coprocessor. If the troubleshooting information does not address your problem, contact your service representative.</li>
<li class="ulchildlink"><strong><a href="rzajcaccel2058.htm">2058 Cryptographic Accelerator</a></strong><br />
The 2058 Cryptographic Accelerator is available for customers to use with a V5R2 (or later) system.</li>
<li class="ulchildlink"><strong><a href="rzajcrelativeinfo.htm">Related information for cryptographic hardware</a></strong><br />
Read this information to learn about product manuals and IBM Redbooks™ (in
PDF format), Web sites, and information center topics that relate to the cryptographic
hardware topic. You can view or print any of the PDFs</li>
</ul>
</div>
<img src="./deltaend.gif" alt="End of change" /></body>
</html>