There are several things intertwined here.

*       CPACF is the "crypto on the chip" - z Systems instructions that do AES 
et al.

*       CEX is the z HSM.

*       ICSF is, of course, the z/OS service that talks to both (though you can 
do CPACF operations directly as well).

With just CPACF, you're forced to use what's called Clear Key operation: keys 
are stored (somewhere, somehow-perhaps in CKDS), are fetched, and are passed to 
CPACF to do operations.

With CEX in the mix, you add two more options: Secure Key and Protected Key.

Secure Key means that keys are generated by the CEX, wrapped (encrypted) using 
keys known only to the CEX, and then passed to z/OS, which stores them (usually 
in CKDS). When an operation is performed, that wrapped key and the data are 
passed to the CEX, which unwraps the key, does the operation, and returns the 
result. Very secure, if relatively slow.

Protected Key means that keys are generated by the CEX, wrapped, and stored in 
CKDS, like Secure Key. BUT when an operation is needed, an ICSF call takes that 
wrapped key and passes it to the CEX, where it is unwrapped, rewrapped using an 
ephemeral key generated just for the current IPL, and that key is returned. 
That ephemeral key is also passed to the firmware, so it's available to CPACF. 
Then the actual operation is performed by passing the rewrapped key: CPACF 
unwraps it using that ephemeral key, does the operation, returns the result. 
And ICSF remembers that it's done this, so the next operation using that key 
doesn't talk to the HSM at all. This gets you almost all of the performance and 
pretty well all of the security of Secure Key (arguably the firmware is 
slightly less secure than the tamper-resistant HSM, but the memory used in the 
firmware to hold that key is protected-it's apparently not even visible in HMC 
dumps).

So your customer can switch to using Protected Key, at least in theory. How 
hard this is will depend on how keys are generated and managed now, as well as 
whether they're using ICSF or 'raw' CPACF now, as well as whether they're up 
for reprotecting all of their existing data with the new key.

Does this help?
--
...phsiii

Phil Smith III
Senior Architect & Product Manager, Mainframe & Enterprise
Distinguished Technologist
HPE Data Security

phs...@hpe.com<mailto:phs...@hpe.com>
T 703-476-4511
M 703-568-6662
Hewlett Packard Enterprise
Herndon, VA


----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to