The "Encryption Facility for z/VSE" product is used to transport data between VSE and z/OS or other platform that would accept data encrypted by ""Encryption Facility for z/OS".

It does *not* support "data at rest". It does allow you to copy and encrypt a file, but the whole file has to be decrypted and restored before it can be used by the system. That is not "data at rest"

There is only one "data at rest" product for VSE. Dino/Protect.

I developed Dino/Protect back in 2007. http://www.dinoprotect.com

But, here is the real crux of the matter. While I sold about a dozen copies of the back-up encryption piece, nobody in the VSE community though "data at rest" was needed. All they want is encrypted backups. And, since then, encrypted tape drives have been developed by IBM so everybody is going that route.

So, it's available, but nobody came to the party.

For those that are wondering about the key, the root for the key is a random string somewhere in the middle of the software. The root is manipulated, then ORed, then encrypted, then manipulated again prior to actually being used as the key to call CPACF. (The manipulation and encryption is also done by the CPACF.) And, while it's just 128 AES, I could easily support any key length supported by CPACF.

The software even supports encrypting just specific fields, of any length, within the record. It also has program controls so that an IDCAMS EXPORT does not decrypt the data during backups.

But, again, nobody came to the party. :-(

Tony Thigpen

Joerg Schmidbauer wrote on 06/19/2017 09:22 AM:
Todd pointed me to this topic, because it's a z/VSE related question, not z/OS.
From my point of view Tony and Todd explained everything correctly.
Just one additional info:
There is an optional feature "Encryption Facility for z/VSE" that allows 
encrypting
data at rest (Librarian members, VSAM files, backup tapes, real tapes and 
vtapes).
It's functionality and usage is described in the z/VSE Administration Guide:
https://www.ibm.com/systems/z/os/zvse/documentation/#vse
It uses CPACF and crypto cards transparently. CPACF is used for encrypting the
data. A crypto card is needed only when using public-key encryption (refer to 
the book)
with an RSA key greater than 1024 bits. The other option is "password-based"
encryption, where the symmetric key gets derived from a password/passphrase.


----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN



----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to