Concepts of IBM Z cryptographic hardware
IBM Z® systems offer different types of cryptographic hardware with different features to meet a customer's cryptographic requirements.
The variety of available cryptographic capabilities includes:
- Data encryption and decryption using symmetric and asymmetric algorithms.
- Message integrity (message authentication, modification detection, non-repudiation).
- Key management with a variety of services to ensure security and integrity of keys with different levels of protection.