ibm-information-center/dist/eclipse/plugins/i5OS.ic.rzajc_5.4.0.1/rzajcworking.htm

72 lines
5.4 KiB
HTML

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en-us" xml:lang="en-us">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="security" content="public" />
<meta name="Robots" content="index,follow" />
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
<meta name="DC.Type" content="concept" />
<meta name="DC.Title" content="Manage the Cryptographic Coprocessor" />
<meta name="abstract" content="After you set up your Cryptographic Coprocessor, you can begin writing programs to make use of your Cryptographic Coprocessor's cryptographic functions." />
<meta name="description" content="After you set up your Cryptographic Coprocessor, you can begin writing programs to make use of your Cryptographic Coprocessor's cryptographic functions." />
<meta name="DC.Relation" scheme="URI" content="rzajcco4758.htm" />
<meta name="DC.Relation" scheme="URI" content="rzajclogging.htm" />
<meta name="DC.Relation" scheme="URI" content="rzajcquerying.htm" />
<meta name="DC.Relation" scheme="URI" content="rzajcinitialstore.htm" />
<meta name="DC.Relation" scheme="URI" content="rzajccreatekeys.htm" />
<meta name="DC.Relation" scheme="URI" content="rzajcciphering.htm" />
<meta name="DC.Relation" scheme="URI" content="rzajcworkpin.htm" />
<meta name="DC.Relation" scheme="URI" content="rzajcsignfile.htm" />
<meta name="copyright" content="(C) Copyright IBM Corporation 2006" />
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 2006" />
<meta name="DC.Format" content="XHTML" />
<meta name="DC.Identifier" content="rzajcworking" />
<meta name="DC.Language" content="en-us" />
<!-- All rights reserved. Licensed Materials Property of IBM -->
<!-- US Government Users Restricted Rights -->
<!-- Use, duplication or disclosure restricted by -->
<!-- GSA ADP Schedule Contract with IBM Corp. -->
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
<link rel="stylesheet" type="text/css" href="./ic.css" />
<title>Manage the Cryptographic Coprocessor</title>
</head>
<body id="rzajcworking"><a name="rzajcworking"><!-- --></a>
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
<h1 class="topictitle1">Manage the Cryptographic Coprocessor</h1>
<div><p>After you set up your Cryptographic Coprocessor, you can begin
writing programs to make use of your Cryptographic Coprocessor's cryptographic
functions.</p>
<p>This section is mainly for i5/OS™ application use of the Cryptographic
Coprocessor.</p>
<div class="note"><span class="notetitle">Note:</span> Many of the pages in this section include one or more program examples.
Change these programs to suit your specific needs. Some require that you change
only one or two parameters while others require more extensive changes. For
security reasons, IBM<sup>®</sup> recommends that you individualize these program examples
rather than using the default values provided.</div>
</div>
<div>
<ul class="ullinks">
<li class="ulchildlink"><strong><a href="rzajclogging.htm">Log on or off of the Cryptographic Coprocessor</a></strong><br />
You can log on or off the Cryptographic Coprocessor by working with role-restricted APIs.</li>
<li class="ulchildlink"><strong><a href="rzajcquerying.htm">Query status or request information</a></strong><br />
You can query your Cryptographic Coprocessor to determine characteristics such as which algorithms are enabled, the key lengths it supports, the status of the master key, the status of cloning, and the clock setting.</li>
<li class="ulchildlink"><strong><a href="rzajcinitialstore.htm">Initialize a key store file</a></strong><br />
A key store file is a database file that stores operational keys, i.e. keys encrypted under the master key. Read this information if you plan to keep records of your DES and PKA keys.</li>
<li class="ulchildlink"><strong><a href="rzajccreatekeys.htm">Create DES and PKA keys</a></strong><br />
You can create DES and PKA keys and store them in a DES key store.</li>
<li class="ulchildlink"><strong><a href="rzajcciphering.htm">Encrypt or decrypt a file</a></strong><br />
One of the more practical uses for your Cryptographic Coprocessor is encrypting and decrypting data files.</li>
<li class="ulchildlink"><strong><a href="rzajcworkpin.htm">Work with PINs</a></strong><br />
A financial institution uses personal identification numbers (PINs) to authorize personal financial transactions for its customers. A PIN is similar to a password except that a PIN consists of decimal digits and is normally a cryptographic function of an associated account number. You can use your Cryptographic Coprocessor to work with PINs.</li>
<li class="ulchildlink"><strong><a href="rzajcsignfile.htm">Generate and verify a digital signature</a></strong><br />
You can protect data from undetected changes by including a proof of identity value called a digital signature.</li>
</ul>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="rzajcco4758.htm" title="IBM offers two Cryptographic Coprocessors, which are available on a variety of server models.">4764 and 4758 Cryptographic Coprocessors</a></div>
</div>
</div>
</body>
</html>