Well, to quote from POP (for one PCKMO option)
(should be Perform Cryptographic Key Management Operation, btw)

The 8-byte cryptographic key, K, in byte offsets 0-7 of
he parameter block is encrypted using the DEA
wrapping key. (See the section "Protection of Crypto-
graphic Key" on page 7-339 for the encryption algo-
rithm.) The result is placed back in byte offsets 0-7 of
he parameter block. The contents of the DEA wrap-
ping-key verification-pattern register are placed in
byte offsets 8-31 of the parameter block.

So going to 7-339 it says things like

Each time a clear reset is performed, a new set of
wrapping keys and their associated verification pat-
terns are generated. The contents of the two wrap-
ping-key registers are kept internal to the model so
that no program, including the operating system, can
directly observe their clear value.

I.e, they're just generated in the hardware.

Apparently. 

(I'm reading this stuff for the first time, out of curiosity mostly. It usually 
takes about ten times nowadays before true enlightenment dawns).

David Stokes
INTERCHIP AG
Munich



-----Ursprüngliche Nachricht-----
Von: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] Im Auftrag 
von Rob Schramm
Gesendet: Montag, 9. Juli 2012 18:13
An: IBM-MAIN@LISTSERV.UA.EDU
Betreff: Re: Secure Encryption Keys vs Protected Keys

How is the key generated?

Rob Schramm
Senior Systems Consultant
Imperium Group



On Mon, Jul 9, 2012 at 12:07 PM, David Stokes <sto...@interchip.de> wrote:

> Well, you can encrypt a protected key with PCKMO (Perform cryptographic
> management operation) instruction, as appears to be done in some of the
> white paper tests, so I'm not convinced CEX is absolutely required.
> However, I see little sense, as I said before, in doing such a thing. It
> would somewhat void the point of having protected (i.e. secure) keys in the
> first place.
>
> I didn't feel the point important enough to comment on before.
>
> -----Ursprüngliche Nachricht-----
> Von: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] Im
> Auftrag von Tom Ambros
> Gesendet: Montag, 9. Juli 2012 16:22
> An: IBM-MAIN@LISTSERV.UA.EDU
> Betreff: Re: Secure Encryption Keys vs Protected Keys
>
> Phil Smith wrote:
>
> "Yes, Protected Key requires ICSF and a CEX."
>
> Should that not read  "Yes, Secure Key requires ICSF and a CEX."?
>
> Blatant plagiarism follows from my copy of the z196 Tech Guide, Section
> 6.2.2 'CPACF Protected key':
>
> "The zEnterprise CPCs support the protected key implementation. Since
> PCIXCC
> deployment, secure keys are processed on the PCI-X and PCIe cards,
> requiring an
> asynchronous operation to move the data and keys from the general purpose
> CP to the
> crypto cards. Clear keys process faster than secure keys because the
> process is done
> synchronously on the CPACF. Protected keys blend the security of Crypto
> Express3
> coprocessors (CEX3C) and the performance characteristics of the CPACF,
> running closer to
> the speed of clear keys.
>
> An enhancement to CPACF facilitates the continued privacy of cryptographic
> key material
> when used for data encryption. In Crypto Express3 coprocessors, a secure
> key is encrypted
> under a master key, whereas a protected key is encrypted under a wrapping
> key that is
> unique to each LPAR. After the wrapping key is unique to each LPAR, a
> protected key cannot
> be shared with another LPAR. CPACF, using key wrapping, ensures that key
> material is not
> visible to applications or operating systems during encryption operations.
>
> CPACF code generates the wrapping key and stores it in the protected area
> of hardware
> system area (HSA). The wrapping key is accessible only by firmware. It
> cannot be accessed
> by operating systems or applications. DES/T-DES and AES algorithms were
> implemented in
> CPACF code with support of hardware assist functions. Two variations of
> wrapping key are
> generated, one for DES/T-DES keys and another for AES keys."
>
> Note that CPACF generates the wrapping key and the use of the term
> 'protected key' in this context.  Thus my confusion, I am not entirely
> sure that the CEX hardware is required in this case.  I see the
> distinction that is drawn between 'secure key' and 'protected key' and I
> believe it is significant.
>
>
> Thomas Ambros
> Operating Systems and Connectivity Engineering
> 518-436-6433
>
> This communication may contain privileged and/or confidential information.
> It is intended solely for the use of the addressee. If you are not the
> intended recipient, you are strictly prohibited from disclosing, copying,
> distributing or using any of this information. If you received this
> communication in error, please contact the sender immediately and destroy
> the material in its entirety, whether electronic or hard copy. This
> communication may contain nonpublic personal information about consumers
> subject to the restrictions of the Gramm-Leach-Bliley Act. You may not
> directly or indirectly reuse or redisclose such information for any purpose
> other than to provide the services for which you are receiving the
> information.
>
> 127 Public Square, Cleveland, OH 44114
> If you prefer not to receive future e-mail offers for products or services
> from Key
> send an e-mail to mailto:dnereque...@key.com with 'No Promotional
> E-mails' in the
> SUBJECT line.
>
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to