IBM® offers
cryptography solutions for customers who require a high level of security.
A comprehensive cryptography solution is an important part of a successful
security strategy. IBM offers a family of cryptographic hardware options
for protecting data and for securing transaction processing, as well as a
set of cryptographic services APIs that customers can use to customize their
programs.
You can make cryptography an integral part of your security solution by
installing cryptographic hardware in your system. To ensure that you understand
how cryptographic hardware works and how you can implement it in your system,
review these topics:
- What’s new for V5R4 highlights the new features or functions available
for this release of the system.
- Printable PDF provides a link to the PDF version of this information and
explains the printing options that are available to you.
- Cryptography concepts provides a basic understanding of cryptographic
functions, as well as an overview of the system's cryptographic services.
- Cryptographic hardware:
- Cryptographic hardware concepts explain some basic concepts regarding
the cryptographic hardware available for your system, enabling you to better
understand how to maximize your usage of cryptography and cryptographic hardware
options with your server.
- Usage scenarios offer some example configurations or uses of cryptographic
hardware:
- Cryptographic hardware scenario: Protect private keys with cryptographic
hardware
- Cryptographic hardware scenario: Write an i5/OS™ application to use the IBM Cryptographic
Coprocessors
- Choosing the best cryptographic hardware for your server:
- Cryptographic Coprocessors includes planning and configuration information
for the IBM 4764
and 4758 Cryptographic Coprocessors.
- 2058 Cryptographic Accelerator includes planning and configuration information
for the 2058 Cryptographic Accelerator.
- Related information points to other sources of cryptographic information,
as well as related product information sites.