6947ch05.fm Draft Document for Review April 7, 2004 6:15 pm
120 IBM eServer zSeries 990 Technical Guide
5.1 Cryptographic function support
The z990 includes both standard cryptographic hardware and optional cryptographic
features, to give flexibility and growth capability. IBM has a long history of providing hardware
cryptographic solutions, from the development of Data Encryption Standard (DES) in the
1970s to delivering the only integrated cryptographic hardware in a server to achieve the US
Government's highest FIPS 140-2 Level 4 rating for secure cryptographic hardware.
The z990 cryptographic functions include the full range of cryptographic operations needed
for e-business, e-commerce, and financial institution applications. In addition, custom
cryptographic functions can be added to the set of functions that the z990 offers.
Today, e-business applications are increasingly relying on cryptographic techniques to
provide the confidentiality and authentication required in this environment. Secure Sockets
Layer (SSL) technology is a key technology for conducting secure e-commerce using Web
servers, and it is in use by a rapidly increasing number of e-business applications, demanding
new levels of security and performance.

5.1.1 Cryptographic Synchronous functions

For clear key functions only, the hardware includes implementation of the following:
򐂰Data encryption/decryption algorithms
Data Encryption Standard (DES)
Double length-key DES
Triple length- key DES (TDES)
򐂰Hashing algorithms SHA-1
򐂰Message authentication code (MAC):
single-key MAC
double-key MAC

5.1.2 Cryptographic Asynchronous functions

For secured key functions, Cryptographic Asynchronous functions process messages that are
passed to it.
򐂰Data encryption/decryption algorithms
Data Encryption Standard (DES)
Double length-key DES
Triple length- key DES
򐂰DES key generation and distribution
򐂰PIN generation, verification and translation functions
򐂰Pseudo Random Number (PRN) Generator
򐂰Public Key Algorithm (PKA) Facility
These commands are intended for application programs using public key algorithms,
including:
Importing RSA public-private key pairs in clear and encrypted forms.
Rivest-Shamir-Adelman (RSA)
Key generation, up to 2048-bit.
Signature Verification, up to 2048-bit.