> -----Original Message-----
> From: IBM Mainframe Discussion List [mailto:[email protected]] On
> Behalf Of Rob Schramm
> Sent: Tuesday, November 15, 2011 10:53 PM
> To: [email protected]
> Subject: Re: Data encrypt
> 
> Peter,
> 
> No, I am not talking about that...
> 
> The issue is that CPACF clear key is tremendously faster than Secure
> Key.  Secure key is the process where the DEK or Operational Key is
> encrypted under the Master Key but the process is 2 - 3 millisecond
> for TDES to encrypt or decrypt a card number.  Protected key is a
> pretty cool way to merge the security of Secure Key and the
> performance of Clear key.

Very interesting stuff, thank you for those links.  I was not aware of this z10 
capability at the time I did the performance testing I mentioned earlier.

I notice that the performance benchmarks that IBM reports measure CPACF 
performance in 10**6 bytes per second, while the crypto express card 
performance is measured in 10**3 bytes per second.  Very interesting to have 
that performance difference confirmed.

Unfortunately, it appears that using the "protected key" path does require a 
customer to create an APF-authorized program to generate the "wrapped" key, 
introducing yet another item requiring auditing and protection.  However, the 
gain in the level of key protection may well be worth that administrative cost. 
 As usual, YMMV.

It would be a boon to the community if someone (I can not do this myself) would 
enter a marketing request to IBM to make this "protected key" process part of 
the existing callable subroutine provided by ICSF to retrieve a clear key 
(CSNBKRR), rather than requiring customers to create APF-authorized code.  One 
of the passed parameters to CSNBKRR could specify that the labeled clear key is 
to be protected before the value from the key store is returned.  The protected 
key could then be passed directly to the "clear key" subroutines (CSNSYBE/D) 
with a parameter telling them that the passed key value is a protected value.

It would also help if IBM were requested to dramatically reduce the CPU 
overhead of using ICSF subroutines in the first place.  The abysmal performance 
of ICSF callable subroutines almost makes it a requirement for customers to 
"roll their own" methods when it comes to encryption, which is not an ideal 
solution.

Thanks again for the updated info and links.

Peter
--


This message and any attachments are intended only for the use of the addressee 
and may contain information that is privileged and confidential. If the reader 
of the message is not the intended recipient or an authorized representative of 
the intended recipient, you are hereby notified that any dissemination of this 
communication is strictly prohibited. If you have received this communication 
in error, please notify us immediately by e-mail and delete the message and any 
attachments from your system.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to