94 lines
3.4 KiB
HTML
94 lines
3.4 KiB
HTML
|
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
|
||
|
<html>
|
||
|
<head>
|
||
|
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
|
||
|
<meta name="Copyright" content="Copyright (c) 2006 by IBM Corporation">
|
||
|
<title>Cryptographic Services APIs</title>
|
||
|
<!-- Begin Header Records ========================================== -->
|
||
|
<!-- All rights reserved. Licensed Materials Property of IBM -->
|
||
|
<!-- US Government Users Restricted Rights -->
|
||
|
<!-- Use, duplication or disclosure restricted by -->
|
||
|
<!-- GSA ADP Schedule Contract with IBM Corp. -->
|
||
|
<!-- Change History: -->
|
||
|
<!-- YYMMDD USERID Change description -->
|
||
|
<!-- 030131 JETAYLOR new for V5R3 -->
|
||
|
<!-- 040323 BILLINGS Add link to crypto scenario and example programs -->
|
||
|
<!-- Change link to cryptographic concepts -->
|
||
|
<!-- 040331 BILLINGS Add link to OS/400 and 2058 Function Comparison -->
|
||
|
<!-- End Header Records -->
|
||
|
<link rel="stylesheet" type="text/css" href="../rzahg/ic.css">
|
||
|
</head>
|
||
|
<body>
|
||
|
<script language="Javascript" src="../rzahg/synch.js" type="text/javascript">
|
||
|
</script>
|
||
|
|
||
|
<a name="Top_Of_Page"></a>
|
||
|
|
||
|
<h2>Cryptographic Services APIs</h2>
|
||
|
|
||
|
<p>The i5/OS<SUP>(TM)</SUP> Cryptographic Services APIs help you ensure the
|
||
|
following:</p>
|
||
|
|
||
|
<ul>
|
||
|
<li>Privacy of data</li>
|
||
|
|
||
|
<li>Integrity of data</li>
|
||
|
|
||
|
<li>Authentication of communicating parties</li>
|
||
|
|
||
|
<li>Non-repudiation of messages</li>
|
||
|
</ul>
|
||
|
|
||
|
<p>For general information about cryptography, refer to
|
||
|
<a href="../rzajc/rzajcconcepts.htm">Cryptography Concepts</a> in the Security topic.</p>
|
||
|
|
||
|
<p>The Cryptographic Services APIs perform cryptographic functions within the i5/OS<SUP>(TM)</SUP> or on the 2058
|
||
|
Cryptographic Accelerator for iSeries, as specified by the user. For more information about hardware
|
||
|
cryptography, refer to
|
||
|
<a href="../rzajc/rzajcoverview.htm">Cryptographic Hardware</a> in the Security topic.
|
||
|
For a comparison of function performed in the i5/OS and on the 2058, refer to
|
||
|
<a href="qc3Compare.htm">i5/OS and 2058
|
||
|
Function Comparison</a>.</p>
|
||
|
|
||
|
<p>The Cryptographic Services APIs include:</p>
|
||
|
|
||
|
<ul>
|
||
|
<li><a href="catcrypt2.htm">Encryption and Decryption APIs</a></li>
|
||
|
|
||
|
<li><a href="catcrypt3.htm">Authentication APIs</a></li>
|
||
|
|
||
|
<li><a href="catcrypt4.htm">Key Generation APIs</a></li>
|
||
|
|
||
|
<li><img src="delta.gif" alt="Start of change"><a href="catcrypt6.htm">Key Management APIs</a>
|
||
|
<img src="deltaend.gif" alt="End of change"></li>
|
||
|
|
||
|
<li><a href="catcrypt5.htm">Pseudorandom Number Generation APIs</a></li>
|
||
|
|
||
|
<li><a href="catcrypt1.htm">Cryptographic Context APIs</a></li>
|
||
|
</ul>
|
||
|
|
||
|
<p><a href="qc3Scenario.htm">Scenario: Key Management and File Encryption
|
||
|
Using the Cryptographic Services APIs</a>
|
||
|
provides some sample designs and example programs.</p>
|
||
|
|
||
|
<p><img src="delta.gif" alt="Start of change">In the release following
|
||
|
V5R4, Licensed Product 5722-CR1 will no longer be supported.
|
||
|
<a href="qc3MigrateCR1.htm">Migrating from 57xx-CR1</a> provides information
|
||
|
on migrating your CR1 applications to the cryptographic services APIs.
|
||
|
<img src="deltaend.gif" alt="End of change"> </p>
|
||
|
|
||
|
<br>
|
||
|
|
||
|
|
||
|
<hr>
|
||
|
<center>
|
||
|
<table cellpadding="2" cellspacing="2">
|
||
|
<tr align="center">
|
||
|
<td valign="middle" align="center"><a href="aplist.htm">APIs by category</a></td>
|
||
|
</tr>
|
||
|
</table>
|
||
|
</center>
|
||
|
</body>
|
||
|
</html>
|
||
|
|