IBM i and 2058 Cryptographic Function Comparison

The following table lists what cryptographic functions are available in the IBM® i operating system and on the 2058 Cryptographic Accelerator through the cryptographic services APIs.

  Function IBM i 2058
  Qc3EncryptData, Qc3DecryptData, Qc3TranslateData
    DES ECB Yes Yes
    DES CBC Yes Yes
    DES OFB Yes No
    DES CFB 1-bit Yes No
    DES CFB 8-bit Yes No
    DES CFB 64-bit Yes No
    DES CUSP Yes No
    TDES ECB Yes Yes
    TDES CBC Yes Yes
    TDES OFB Yes No
    TDES CFB 1-bit Yes No
    TDES CFB 8-bit Yes No
    TDES CFB 64-bit Yes No
    TDES CUSP Yes No
    AES ECB Yes No
    AES CBC Yes No
    AES CUSP Yes No
    AES CTR Yes No
    RC2 ECB Yes No
    RC2 CBC Yes No
    RC2 CUSP Yes No
    RC4-compatible Yes No
    RSA Yes Yes1
  Qc3EncryptWithMAC, Qc3DecryptWithMAC
    AES CCM Yes No
  Qc3CalculateMAC
    DES Yes No
    TDES Yes No
    AES Yes No
  Qc3CalculateHash, Qc3CalculateHMAC
    MD5 Yes No
    SHA-1 Yes No
    SHA-256 Yes No
    SHA-384 Yes No
    SHA-512 Yes No
  Qc3CalculateSignature, Qc3VerifySignature Yes Yes2
  Qc3GenPRNs Yes Yes3
  Qc3GenSymmetricKey Yes Yes
  Qc3GenPKAKeyPair Yes No
  Qc3GenDHParms Yes No
  Qc3GenDHKeyPair Yes No
  Qc3CalculateDHSecretKey Yes Yes

1Block formating is done in IBM i.

2Only the encryption is done on the 2058. The block formatting and hash functions are done in IBM i.

3The IBM i PRNG will automatically seed from a crypto card if one is available.


[ Back to top | Cryptographic Services APIs | APIs by category ]