> -----Original Message-----
> From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
> Behalf Of Alan Altmark
/snip/
> > So, why did IBM update ICSF to support clear keys in the CKDS and
> > its address space? Because IBM is marketing its own CPACF solution
> > that requires clear keys. As long as the clear keys are kept in
> > protected storage, it's not a big issue with most sites.
> 
> Jeffrey, I'm not sure of your point.  I was saying that before John McKown
> starting including KM and KMC instructions in his program he should
> consider the affects of having the keys in cleartext in the application
> address space.  If that's ok, with all that implies, fine.  If that's not
> ok, then he should get ICSF functioning again and call the CPACF-based
> encryption routines.  TDES and AES are available.
> 
> The ICSF book has a section on how to use CPACF with ICSF.
> 
> He can, of course, look at alternative solutions to ICSF if he's not
> interested in ICSF.
/snip/

When ICSF uses CPACF instructions, it is using clear keys in "application
storage". In order for ICSF to use CPACF instruction, the keys must be
clear. The keys are not stored encrypted in the CKDS or within the ICSF
address space; the keys are always clear.

The client program must choose:
(1) Use the operational key token (which exposes the clear key in the
client space), or
(2) use the CKDS label for the clear key (which adds overhead for
locating the clear key in the ICSF application storage).

There's no advantage for using ICSF with CPACF over using a home-grown
solution.

So, why bother using ICSF to store clear keys in its VSAM data set? When
CPACF is in use, ICSF has no substantive advantage over any other key
management repository *and* ICSF is *not* a key management *system*.
ICSF is simply a persistent key repository interface for its CKDS.

It's not difficult to roll-your-own key repository, with whatever security
and encryption you want, now that CPACF is available. btw: I would not
recommend hard-coding KM, KMC, etc. through-out an application. I suggest
using an API front-end that is easy to use.

A key management *system* is much more complex than what ICSF offers.


Jeffrey D. Smith
Principal Product Architect
Farsight Systems Corporation
700 KEN PRATT BLVD. #204-159
LONGMONT, CO 80501-6452
303-774-9381 direct
303-484-6170 FAX
http://www.farsight-systems.com/
comments are invited on my encryption project

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to