104 lines
6.6 KiB
HTML
104 lines
6.6 KiB
HTML
|
<?xml version="1.0" encoding="UTF-8"?>
|
|||
|
<!DOCTYPE html
|
|||
|
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
|
|||
|
<html lang="en-us" xml:lang="en-us">
|
|||
|
<head>
|
|||
|
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
|
|||
|
<meta name="security" content="public" />
|
|||
|
<meta name="Robots" content="index,follow" />
|
|||
|
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
|
|||
|
<meta name="DC.Type" content="concept" />
|
|||
|
<meta name="DC.Title" content="Cryptography" />
|
|||
|
<meta name="abstract" content="IBM offers cryptography solutions for customers who require a high level of security." />
|
|||
|
<meta name="description" content="IBM offers cryptography solutions for customers who require a high level of security." />
|
|||
|
<meta name="DC.Relation" scheme="URI" content="rzajcwhatsnew.htm" />
|
|||
|
<meta name="DC.Relation" scheme="URI" content="rzajcprintme.htm" />
|
|||
|
<meta name="DC.Relation" scheme="URI" content="rzajcconcepts.htm" />
|
|||
|
<meta name="DC.Relation" scheme="URI" content="rzajcco4758.htm" />
|
|||
|
<meta name="DC.Relation" scheme="URI" content="rzajctroubleshooting.htm" />
|
|||
|
<meta name="DC.Relation" scheme="URI" content="rzajcaccel2058.htm" />
|
|||
|
<meta name="DC.Relation" scheme="URI" content="rzajcrelativeinfo.htm" />
|
|||
|
<meta name="copyright" content="(C) Copyright IBM Corporation 2006" />
|
|||
|
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 2006" />
|
|||
|
<meta name="DC.Format" content="XHTML" />
|
|||
|
<meta name="DC.Identifier" content="overview" />
|
|||
|
<meta name="DC.Language" content="en-us" />
|
|||
|
<!-- All rights reserved. Licensed Materials Property of IBM -->
|
|||
|
<!-- US Government Users Restricted Rights -->
|
|||
|
<!-- Use, duplication or disclosure restricted by -->
|
|||
|
<!-- GSA ADP Schedule Contract with IBM Corp. -->
|
|||
|
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
|
|||
|
<link rel="stylesheet" type="text/css" href="./ic.css" />
|
|||
|
<title>Cryptography</title>
|
|||
|
</head>
|
|||
|
<body id="overview"><a name="overview"><!-- --></a>
|
|||
|
<img src="./delta.gif" alt="Start of change" /><!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
|
|||
|
<h1 class="topictitle1">Cryptography</h1>
|
|||
|
<div><p> IBM<sup>®</sup> offers
|
|||
|
cryptography solutions for customers who require a high level of security.</p>
|
|||
|
<p>A comprehensive cryptography solution is an important part of a successful
|
|||
|
security strategy. IBM offers a family of cryptographic hardware options
|
|||
|
for protecting data and for securing transaction processing, as well as a
|
|||
|
set of cryptographic services APIs that customers can use to customize their
|
|||
|
programs.</p>
|
|||
|
<p>You can make cryptography an integral part of your security solution by
|
|||
|
installing cryptographic hardware in your system. To ensure that you understand
|
|||
|
how cryptographic hardware works and how you can implement it in your system,
|
|||
|
review these topics:</p>
|
|||
|
<div class="note"><span class="notetitle">Note:</span> This information includes programming examples. Read the <a href="codedisclaimer.htm#codedisclaimer">Code license and disclaimer information</a> for
|
|||
|
important legal information.</div>
|
|||
|
<div class="p"><ul><li>What’s new for V5R4 highlights the new features or functions available
|
|||
|
for this release of the system.</li>
|
|||
|
<li>Printable PDF provides a link to the PDF version of this information and
|
|||
|
explains the printing options that are available to you.</li>
|
|||
|
<li>Cryptography concepts provides a basic understanding of cryptographic
|
|||
|
functions, as well as an overview of the system's cryptographic services.</li>
|
|||
|
<li>Cryptographic hardware:<ul><li>Cryptographic hardware concepts explain some basic concepts regarding
|
|||
|
the cryptographic hardware available for your system, enabling you to better
|
|||
|
understand how to maximize your usage of cryptography and cryptographic hardware
|
|||
|
options with your server.</li>
|
|||
|
</ul>
|
|||
|
</li>
|
|||
|
<li>Usage scenarios offer some example configurations or uses of cryptographic
|
|||
|
hardware:<ul><li>Cryptographic hardware scenario: Protect private keys with cryptographic
|
|||
|
hardware</li>
|
|||
|
<li>Cryptographic hardware scenario: Write an i5/OS™ application to use the IBM Cryptographic
|
|||
|
Coprocessors</li>
|
|||
|
</ul>
|
|||
|
</li>
|
|||
|
<li>Choosing the best cryptographic hardware for your server:<ul><li>Cryptographic Coprocessors includes planning and configuration information
|
|||
|
for the IBM 4764
|
|||
|
and 4758 Cryptographic Coprocessors.</li>
|
|||
|
<li>2058 Cryptographic Accelerator includes planning and configuration information
|
|||
|
for the 2058 Cryptographic Accelerator.</li>
|
|||
|
</ul>
|
|||
|
</li>
|
|||
|
<li>Related information points to other sources of cryptographic information,
|
|||
|
as well as related product information sites.</li>
|
|||
|
</ul>
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
<div>
|
|||
|
<ul class="ullinks">
|
|||
|
<li class="ulchildlink"><strong><a href="rzajcwhatsnew.htm">What's new for V5R4</a></strong><br />
|
|||
|
If you are looking for the latest information regarding new cryptographic software and hardware, and added features to the existing cryptographic hardware options, you have come to the right place.</li>
|
|||
|
<li class="ulchildlink"><strong><a href="rzajcprintme.htm">Printable PDF</a></strong><br />
|
|||
|
Use this to view and print a PDF of this information.</li>
|
|||
|
<li class="ulchildlink"><strong><a href="rzajcconcepts.htm">Cryptography concepts</a></strong><br />
|
|||
|
This article provides a basic understanding of cryptographic function and an overview of the server's cryptographic services</li>
|
|||
|
<li class="ulchildlink"><strong><a href="rzajcco4758.htm">4764 and 4758 Cryptographic Coprocessors</a></strong><br />
|
|||
|
IBM offers
|
|||
|
two Cryptographic Coprocessors, which are available on a variety of server
|
|||
|
models.</li>
|
|||
|
<li class="ulchildlink"><strong><a href="rzajctroubleshooting.htm">Troubleshoot the Cryptographic Coprocessor</a></strong><br />
|
|||
|
Use these troubleshooting methods to tackle some of the basic problems that may occur with your Cryptographic Coprocessor. If the troubleshooting information does not address your problem, contact your service representative.</li>
|
|||
|
<li class="ulchildlink"><strong><a href="rzajcaccel2058.htm">2058 Cryptographic Accelerator</a></strong><br />
|
|||
|
The 2058 Cryptographic Accelerator is available for customers to use with a V5R2 (or later) system.</li>
|
|||
|
<li class="ulchildlink"><strong><a href="rzajcrelativeinfo.htm">Related information for cryptographic hardware</a></strong><br />
|
|||
|
Read this information to learn about product manuals and IBM Redbooks™ (in
|
|||
|
PDF format), Web sites, and information center topics that relate to the cryptographic
|
|||
|
hardware topic. You can view or print any of the PDFs</li>
|
|||
|
</ul>
|
|||
|
</div>
|
|||
|
<img src="./deltaend.gif" alt="End of change" /></body>
|
|||
|
</html>
|