The cryptographic services APIs can help you ensure the following:
For general information about cryptography, see Cryptography concepts.
The cryptographic services APIs perform cryptographic functions within the IBM® i operating system or on the 2058 Cryptographic Accelerator, as specified by the user. For more information about hardware cryptography, see the Cryptography topic collection in the Security section. For a comparison of functions performed in the operating system and on the 2058, see IBM i and 2058 Cryptographic Function Comparison.
The cryptographic services APIs include:
The cryptographic services exit programs are:
Scenario: Key Management and File Encryption Using the Cryptographic Services APIs provides some sample designs and example programs.
In V6R1, IBM dropped support of Licensed Product 5722-CR1. Migrating from 57xx-CR1 provides information on migrating your CR1 applications to the cryptographic services APIs.
The educational white paper Protecting i5/OS data with encryption provides information on encrypting data at rest (primarily, the data stored in IBM DB2® tables and physical files). Recommended practices for key management are also discussed.
[ Back to top | APIs by category ]