On 23 April 2013 16:23, R.S. <[email protected]> wrote: > W dniu 2013-04-23 18:07, Tony Harminc pisze:
>> Which of course raises the questions of how well the card interfaces are >> documented, > > There are NOT documented, which is clearly documented. > >> and whether the cards are available for other platforms. > > Yes, obviously. There have been since first model (PCICC). But without documentation? Probably hard to use... > Actually all mainframe cards are PCI, PCIX or PCIe cards inserted in IBM card > case. > The same models were available for other platforms including iSeries, > pSeries and xSeries (PCs). It's called 46xx. > > Of course it's nothing specific - OSA cards are also PCI cards (from Intel) > with some additional logic and additional case, not to mention additional > price ;-) Sure, I realize that. But without documentation or at least drivers, there is little use to a card that complies only with the hardware standards. >> Some years ago researchers at Ross Anderson's security lab at Cambridge >> mounted a >> successful attack on earlier IBM crypto APIs, and I seem to remember >> there was a time when they were offering a bounty of some sort for a new >> card. > > Can you provide any details? Maybe some link? The best place to start is http://www.cl.cam.ac.uk/~rnc1/descrack/index.html Note that despite the URL, this is *not* a general discussion on DES cracking, but is quite specific to IBM crypto APIs and cards. Note also that the problems described were fixed long ago (and were disclosed responsibly to IBM). There are many good links, though a couple are stale. Tony H. ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN
