Encryption Facility for Z/OS Version 1.Release 2

Encryption Facility for Z/OS Version 1.Release 2

Encryption Facility for z/OS Version 1.Release 2 Using Encryption Facility for OpenPGP IBM SA23-2230-40 Note Before using this information and the product it supports, read the information in “Notices” on page 193. This edition applies to Version 1 Release 2 of IBM Encryption Facility for z/OS (5655-P97) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2021-09-30 © Copyright International Business Machines Corporation 2007, 2021. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures................................................................................................................. ix Tables.................................................................................................................. xi About this document...........................................................................................xiii Who should read this document............................................................................................................... xiii How to use this document.........................................................................................................................xiii Where to find more information................................................................................................................ xiii Related publications............................................................................................................................ xiii Other sources of information.................................................................................................................... xiv IBM discussion area.............................................................................................................................xiv Internet sources...................................................................................................................................xiv How to send your comments to IBM.................................................................... xvii If you have a technical problem............................................................................................................... xvii Summary of changes...........................................................................................xix Changes made in IBM Encryption Facility for z/OS Version 1 Release 2................................................. xix Changes made in IBM Encryption Facility for z/OS Version 1 Release 2 as updated September 2015.......................................................................................................................................................xx Changes made in IBM Encryption Facility for z/OS Version 1 Release 2 as updated June 2014........... xxi Chapter 1. Overview of IBM Encryption Facility for OpenPGP.................................. 1 What is Encryption Facility for OpenPGP? ..................................................................................................1 What is OpenPGP?..................................................................................................................................1 What does Encryption Facility for OpenPGP do?...................................................................................1 Understanding OpenPGP ............................................................................................................................ 2 Understanding session keys and data encryption ................................................................................2 Understanding public-key encryption....................................................................................................2 Understanding passphrase-based encryption...................................................................................... 3 How Encryption Facility for OpenPGP works.............................................................................................. 3 Using z/OS data sets...............................................................................................................................3 Compressing data...................................................................................................................................4 Using ASCII Armor..................................................................................................................................4 Authenticating through digital signatures............................................................................................. 4 Using security keys, certificates, and repositories................................................................................ 4 Using ICSF and RACF..............................................................................................................................5 Participating in OpenPGP key exchange................................................................................................6 Java algorithm support for Encryption Facility for OpenPGP..................................................................... 6 Default OpenPGP algorithm preferences.................................................................................................... 9 Symmetric algorithm preference list..................................................................................................... 9 Message digest algorithm preference list..............................................................................................9 Compression algorithm preference list............................................................................................... 10 Supported key sizes...................................................................................................................................10 Encryption Facility considerations when changing Java release levels...................................................10 Supported character sets.......................................................................................................................... 11 Hardware and software requirements...................................................................................................... 12 Hardware requirements....................................................................................................................... 12 Software requirements........................................................................................................................ 12 iii Chapter 2. Getting started................................................................................... 15 How do I install Encryption Facility for OpenPGP?................................................................................... 15 ICSF considerations...................................................................................................................................15 RACF considerations..................................................................................................................................16 Batch, UNIX System Services, and Java considerations.......................................................................... 16 Getting started basic steps........................................................................................................................16 Chapter 3. Using Encryption Facility for OpenPGP.................................................19 Reading and writing to z/OS data sets...................................................................................................... 19 Types of data sets.................................................................................................................................19 Restrictions using data sets................................................................................................................. 19 Allocating data sets through the data definition (DD) statement....................................................... 20 Language Environment (LE)................................................................................................................. 20 Other data set considerations..............................................................................................................20 OpenPGP messages...................................................................................................................................20 Using Encryption Facility for OpenPGP commands and options........................................................ 20 Authenticating digital signatures...............................................................................................................21 Using the OpenPGP keyring.......................................................................................................................22 Chapter 4. Encryption Facility for OpenPGP commands.........................................23 Configuration file and home directory.......................................................................................................23 OUTPUT_FILE.......................................................................................................................................23 KEY_RING_FILENAME......................................................................................................................... 24 USE_ASYNC_IO....................................................................................................................................24

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    228 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us