Previous topic |
Next topic |
Contents |
Index |
Contact z/OS |
Library |
PDF
Introducing Symmetric Key Cryptography and Using Symmetric Key Callable Services z/OS Cryptographic Services ICSF Application Programmer's Guide SA22-7522-16 |
|
The Integrated Cryptographic Service Facility protects data from unauthorized disclosure or modification. ICSF protects data stored within a system, stored in a file off a system on magnetic tape, and sent between systems. ICSF also authenticates the identity of customers in the financial industry and authenticates messages from originator to receiver. It uses cryptography to accomplish these functions. ICSF provides access to cryptographic functions through callable services. A callable service is a routine that receives control using a CALL statement in an application language. Each callable service performs one or more cryptographic functions, including:
This topic provides an overview of the symmetric key cryptographic functions provided in ICSF, explains the functions of the cryptographic keys, and introduces the topic of building key tokens. Many services have hardware requirements. See each service for details. |
Copyright IBM Corporation 1990, 2014
|