Using Encryption Facility for Openpgp

Using Encryption Facility for Openpgp

Encryption Facility for z/OS Version 1 Release 2 Using Encryption Facility for OpenPGP IBM SA23-2230-30 Note Before using this information and the product it supports, read the information in “Notices” on page 183. This edition applies to Version 1 Release 2 of IBM Encryption Facility for z/OS (5655-P97) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2019-02-17 © Copyright International Business Machines Corporation 2007, 2019. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents List of Figures....................................................................................................... ix List of Tables........................................................................................................ xi About this document...........................................................................................xiii Who should read this document............................................................................................................... xiii How to use this document.........................................................................................................................xiii Where to find more information................................................................................................................ xiii Related publications............................................................................................................................ xiii Other sources of information.................................................................................................................... xiv IBM discussion area.............................................................................................................................xiv Internet sources...................................................................................................................................xiv How to send your comments to IBM.....................................................................xvi If you have a technical problem................................................................................................................ xvi Summary of changes..........................................................................................xvii Changes made in IBM Encryption Facility for z/OS Version 1 Release 2................................................ xvii Changes made in IBM Encryption Facility for z/OS Version 1 Release 2 as updated September 2015....................................................................................................................................................xviii Changes made in IBM Encryption Facility for z/OS Version 1 Release 2 as updated June 2014......... xviii Chapter 1. Overview of IBM Encryption Facility for OpenPGP.................................. 1 What is Encryption Facility for OpenPGP? ..................................................................................................1 What is OpenPGP?..................................................................................................................................1 What does Encryption Facility for OpenPGP do?...................................................................................1 Understanding OpenPGP ............................................................................................................................ 2 Understanding session keys and data encryption ................................................................................2 Understanding public-key encryption....................................................................................................2 Understanding passphrase-based encryption...................................................................................... 3 How Encryption Facility for OpenPGP works.............................................................................................. 3 Using z/OS data sets...............................................................................................................................3 Compressing data...................................................................................................................................4 Using ASCII Armor..................................................................................................................................4 Authenticating through digital signatures............................................................................................. 4 Using security keys, certificates, and repositories................................................................................ 4 Using ICSF and RACF..............................................................................................................................5 Participating in OpenPGP key exchange................................................................................................6 Java algorithm support for Encryption Facility for OpenPGP..................................................................... 6 Default OpenPGP algorithm preferences.................................................................................................... 9 Symmetric algorithm preference list..................................................................................................... 9 Message digest algorithm preference list..............................................................................................9 Compression algorithm preference list............................................................................................... 10 Supported key sizes...................................................................................................................................10 Encryption Facility considerations when changing Java release levels...................................................10 Supported character sets.......................................................................................................................... 11 Hardware and software requirements...................................................................................................... 12 Hardware requirements....................................................................................................................... 12 Software requirements........................................................................................................................ 12 Chapter 2. Getting started................................................................................... 15 How do I install Encryption Facility for OpenPGP?................................................................................... 15 ICSF considerations...................................................................................................................................15 RACF considerations..................................................................................................................................16 iii Batch, UNIX System Services, and Java considerations.......................................................................... 16 Getting started basic steps........................................................................................................................17 Chapter 3. Using Encryption Facility for OpenPGP.................................................19 Reading and writing to z/OS data sets...................................................................................................... 19 Types of data sets.................................................................................................................................19 Restrictions using data sets................................................................................................................. 19 Allocating data sets through the data definition (DD) statement....................................................... 20 Language Environment (LE)................................................................................................................. 20 Other data set considerations..............................................................................................................20 OpenPGP messages...................................................................................................................................20 Using Encryption Facility for OpenPGP commands and options........................................................ 20 Authenticating digital signatures...............................................................................................................21 Using the OpenPGP keyring.......................................................................................................................22 Chapter 4. Encryption Facility for OpenPGP commands.........................................23 Configuration file and home directory.......................................................................................................23 OUTPUT_FILE.......................................................................................................................................23 KEY_RING_FILENAME......................................................................................................................... 24 USE_ASYNC_IO....................................................................................................................................24

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    216 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us