z/OS Cryptographic Services ICSF Application Programmer's Guide
Previous topic | Next topic | Contents | Index | Contact z/OS | Library | PDF


Restrictions

z/OS Cryptographic Services ICSF Application Programmer's Guide
SA22-7522-16

The NIST security strength requirements will be enforced, with respect to ECC Curve type (input) and derived key length.

Only the following key types will be generated, skeleton key tokens of any other type will fail.

  • DES: (Legacy DES token)
    • CIPHER
    • DECIPHER
    • ENCIPHER
    • IMPORTER
    • EXPORTER
    • IMP-PKA
  • AES
    • DATA (Legacy AES token)
    • CIPHER (Variable-length symmetric key-token)
    • KEK (Variable-length symmetric key-token)
    • IMPORTER (Variable-length symmetric key-token)
    • EXPORTER (Variable-length symmetric key-token)

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014