Not that key.  The key that will be stored under the "wrapping" key.

Rob Schramm
Senior Systems Consultant
Imperium Group



On Mon, Jul 9, 2012 at 12:38 PM, David Stokes <[email protected]> wrote:

> Well, to quote from POP (for one PCKMO option)
> (should be Perform Cryptographic Key Management Operation, btw)
>
> The 8-byte cryptographic key, K, in byte offsets 0-7 of
> he parameter block is encrypted using the DEA
> wrapping key. (See the section "Protection of Crypto-
> graphic Key" on page 7-339 for the encryption algo-
> rithm.) The result is placed back in byte offsets 0-7 of
> he parameter block. The contents of the DEA wrap-
> ping-key verification-pattern register are placed in
> byte offsets 8-31 of the parameter block.
>
> So going to 7-339 it says things like
>
> Each time a clear reset is performed, a new set of
> wrapping keys and their associated verification pat-
> terns are generated. The contents of the two wrap-
> ping-key registers are kept internal to the model so
> that no program, including the operating system, can
> directly observe their clear value.
>
> I.e, they're just generated in the hardware.
>
> Apparently.
>
> (I'm reading this stuff for the first time, out of curiosity mostly. It
> usually takes about ten times nowadays before true enlightenment dawns).
>
> David Stokes
> INTERCHIP AG
> Munich
>
>
>
> -----Ursprüngliche Nachricht-----
> Von: IBM Mainframe Discussion List [mailto:[email protected]] Im
> Auftrag von Rob Schramm
> Gesendet: Montag, 9. Juli 2012 18:13
> An: [email protected]
> Betreff: Re: Secure Encryption Keys vs Protected Keys
>
> How is the key generated?
>
> Rob Schramm
> Senior Systems Consultant
> Imperium Group
>
>
>
> On Mon, Jul 9, 2012 at 12:07 PM, David Stokes <[email protected]> wrote:
>
> > Well, you can encrypt a protected key with PCKMO (Perform cryptographic
> > management operation) instruction, as appears to be done in some of the
> > white paper tests, so I'm not convinced CEX is absolutely required.
> > However, I see little sense, as I said before, in doing such a thing. It
> > would somewhat void the point of having protected (i.e. secure) keys in
> the
> > first place.
> >
> > I didn't feel the point important enough to comment on before.
> >
> > -----Ursprüngliche Nachricht-----
> > Von: IBM Mainframe Discussion List [mailto:[email protected]] Im
> > Auftrag von Tom Ambros
> > Gesendet: Montag, 9. Juli 2012 16:22
> > An: [email protected]
> > Betreff: Re: Secure Encryption Keys vs Protected Keys
> >
> > Phil Smith wrote:
> >
> > "Yes, Protected Key requires ICSF and a CEX."
> >
> > Should that not read  "Yes, Secure Key requires ICSF and a CEX."?
> >
> > Blatant plagiarism follows from my copy of the z196 Tech Guide, Section
> > 6.2.2 'CPACF Protected key':
> >
> > "The zEnterprise CPCs support the protected key implementation. Since
> > PCIXCC
> > deployment, secure keys are processed on the PCI-X and PCIe cards,
> > requiring an
> > asynchronous operation to move the data and keys from the general purpose
> > CP to the
> > crypto cards. Clear keys process faster than secure keys because the
> > process is done
> > synchronously on the CPACF. Protected keys blend the security of Crypto
> > Express3
> > coprocessors (CEX3C) and the performance characteristics of the CPACF,
> > running closer to
> > the speed of clear keys.
> >
> > An enhancement to CPACF facilitates the continued privacy of
> cryptographic
> > key material
> > when used for data encryption. In Crypto Express3 coprocessors, a secure
> > key is encrypted
> > under a master key, whereas a protected key is encrypted under a wrapping
> > key that is
> > unique to each LPAR. After the wrapping key is unique to each LPAR, a
> > protected key cannot
> > be shared with another LPAR. CPACF, using key wrapping, ensures that key
> > material is not
> > visible to applications or operating systems during encryption
> operations.
> >
> > CPACF code generates the wrapping key and stores it in the protected area
> > of hardware
> > system area (HSA). The wrapping key is accessible only by firmware. It
> > cannot be accessed
> > by operating systems or applications. DES/T-DES and AES algorithms were
> > implemented in
> > CPACF code with support of hardware assist functions. Two variations of
> > wrapping key are
> > generated, one for DES/T-DES keys and another for AES keys."
> >
> > Note that CPACF generates the wrapping key and the use of the term
> > 'protected key' in this context.  Thus my confusion, I am not entirely
> > sure that the CEX hardware is required in this case.  I see the
> > distinction that is drawn between 'secure key' and 'protected key' and I
> > believe it is significant.
> >
> >
> > Thomas Ambros
> > Operating Systems and Connectivity Engineering
> > 518-436-6433
> >
> > This communication may contain privileged and/or confidential
> information.
> > It is intended solely for the use of the addressee. If you are not the
> > intended recipient, you are strictly prohibited from disclosing, copying,
> > distributing or using any of this information. If you received this
> > communication in error, please contact the sender immediately and destroy
> > the material in its entirety, whether electronic or hard copy. This
> > communication may contain nonpublic personal information about consumers
> > subject to the restrictions of the Gramm-Leach-Bliley Act. You may not
> > directly or indirectly reuse or redisclose such information for any
> purpose
> > other than to provide the services for which you are receiving the
> > information.
> >
> > 127 Public Square, Cleveland, OH 44114
> > If you prefer not to receive future e-mail offers for products or
> services
> > from Key
> > send an e-mail to mailto:[email protected] with 'No Promotional
> > E-mails' in the
> > SUBJECT line.
> >
> > ----------------------------------------------------------------------
> > For IBM-MAIN subscribe / signoff / archive access instructions,
> > send email to [email protected] with the message: INFO IBM-MAIN
> >
> > ----------------------------------------------------------------------
> > For IBM-MAIN subscribe / signoff / archive access instructions,
> > send email to [email protected] with the message: INFO IBM-MAIN
> >
>
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to [email protected] with the message: INFO IBM-MAIN
>
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to [email protected] with the message: INFO IBM-MAIN
>

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to