z/OS Cryptographic Services ICSF System Programmer's Guide
Previous topic | Next topic | Contents | Index | Contact z/OS | Library | PDF


Steps for setting up ICSF

z/OS Cryptographic Services ICSF System Programmer's Guide
SA22-7520-17

Perform these tasks to use the ENCIPHER and DECIPHER parameters with ICSF:

  1. Define the key value that is used to encrypt and decrypt the data key. To define the key value, use one of these ICSF key administrative options:
    • Trusted Key Entry (TKE) workstation. For information about how to define the key value using the TKE workstation, see z/OS Cryptographic Services ICSF TKE Workstation User’s Guide.
    • Key generator utility program (KGUP). Use the KGUP panel "ICSF - Create ADD, UPDATE, or DELETE Key Statement" to define the key value. For more information about how to use KGUP panels, see z/OS Cryptographic Services ICSF Administrator’s Guide.

      Be aware of the following restrictions:

      • The length of the data encryption key is limited to 8 bytes, or 56-bit DES. Triple DES support is not available.
      • Key labels are limited to 8 characters because of the fixed size of REPRO storage areas.
      • The REPRO command's encryption algorithm variables are not documented, so you cannot use them to write decryption applications on another system. Therefore, cross-platform exchange is not possible.
  2. Refresh ICSF's cryptographic key data set (CKDS) so that the key value can be used by REPRO.
  3. Ensure that ICSF can support PCF macro calls by specifying COMPAT(YES) in the ICSF installation options. For more information about how to specify ICSF installation options, see Installation, Initialization, and Customization.

    If you had to change the ICSF installation options, you must restart ICSF.

  4. Run the REPRO ENCIPHER or DECIPHER job.

Restrictions:The REPRO command's encryption algorithm variables are not documented, so you cannot use them to write decryption applications on another system. Therefore, cross-platform exchange is not possible.

Recommendation: Do not specify the REPRO parameter PRIVATEKEY, because it exposes the clear data key value. Instead, specify either EXTERNALKEY or INTERNALKEY, and STOREDATAKEY

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014