Concepts of IBM Z cryptographic hardware

IBM Z® systems offer different types of cryptographic hardware with different features to meet a customer's cryptographic requirements.

The variety of available cryptographic capabilities includes:

  • Data encryption and decryption using symmetric and asymmetric algorithms.
  • Message integrity (message authentication, modification detection, non-repudiation).
  • Key management with a variety of services to ensure security and integrity of keys with different levels of protection.