Re: ICSF key exchange scenario

2022-01-16 Thread Todd Arnold
That is a very, very common scenario, and ICSF has API functions (verbs) to support it. Have a look at the Symmetric Key Export and Symmetric Key Import verbs (and their enhanced relatives Symmetric Key Export 2 and Symmetric Key Import 2). Doing this, of course, requires you to have some kind

Re: An older device query - still using??

2021-10-21 Thread Todd Arnold
I just ran across this thread, and thought I'd correct/confirm a couple of things. I spent the first part of my IBM career on the development team that designed the 3890 and 3895, so I am familiar with those machines. First, the 3895 was NOT a printer. It was a specialized kind of check sort

Re: vendor distributes their private key

2019-08-29 Thread Todd Arnold
> crypto non-repudiation can show it came from your machine I certainly agree with this, but you can restrict what "your machine" is so that it's a lot better than just "came from a particular PC" or "came from a particular mainframe". For example, the private key may be stored in something yo

Re: vendor distributes their private key

2019-08-27 Thread Todd Arnold
A few random comments about this discussion: 1. Someone mentioned performance. If that is a concern, use hardware to do the public-key algorithm - for example the Crypto Express HSM. 2. Remember that not all public-key algorithms can directly encrypt data. For example, RSA can, but Elliptic

Re: Pervasive Encryption - why?

2019-08-07 Thread Todd Arnold
Correcting a couple of careless "n" and "m" typos in my previous post... -- Another, similar approach that is sometimes used is to use "key shares" instead of components. The difference is that with components, you must combine ALL of the components to form the master key, but wi

Re: Pervasive Encryption - why?

2019-08-07 Thread Todd Arnold
The master keys, which are stored securely inside the Crypto Express HSM and can never be extracted, are the top-level keys in the key hierarchy. Your application-level keys are stored outside the HSM, encrypted by the master keys. Thus, if the HSM fails, you still have the externally-stored a

Re: ICSF and z/OS 2.3

2019-01-24 Thread Todd Arnold
I'm afraid I can't help on that end. I'm an expert in the HSM (I've been developing them since the first IBM HSM started as a research project in the 1980s), but not in ICSF releases. Hopefully, someone else will know the answers to your questions.

Re: Connect:Direct and ICSF (was ICSF and z/OS 2.3)

2019-01-23 Thread Todd Arnold
In particular, you don't get any of the financial crypto verbs without a Crypto Express. The standards do not allow banks to perform functions like those unless they are executed in a physically and logically secure crypto device.

Re: ICSF and z/OS 2.3

2019-01-23 Thread Todd Arnold
There have been several changes over the years to improve performance of random number generation, but the important thing is that the random numbers were always generated using secure methods. As Greg mentioned, ICSF started using the CEX long ago to get random numbers, which were generated in

Re: Crypto Express benefits and alternatives

2018-10-30 Thread Todd Arnold
As Radoslaw says in his post, RACF and the usual Z host security is indeed very, very good, but they do not protect you against everything. For example, an insider attack by a sufficiently-authorized person could disclose keys protected by RACF - there are people who can get to data on disk or

Re: Crypto Utilization Question

2018-10-05 Thread Todd Arnold
Unfortunately, crypto card utilization is a complex thing because the HSM cards themselves can execute multiple operations simultaneously, depending on the mix your applications are sending it. A simple example is the fact that the cards have completely independent hardware for symmetric key cr

Re: Encryption keys and EM waves

2018-09-04 Thread Todd Arnold
> Are the specific results of the various tests a available to review? Not to my knowledge. Generally, the only thing that is public is a binary "yes/no" on the test results, and some (often detailed) description of the product's features that were tested. For examples of the latter, see the F

Re: Encryption keys and EM waves

2018-08-31 Thread Todd Arnold
For things like FIPS 140, IBM does its own testing before we send anything to the independent lab for them to test. Then, the lab does their own testing for the formal certification. -- For IBM-MAIN subscribe / signoff / archiv

Re: Encryption keys and EM waves

2018-08-30 Thread Todd Arnold
High-end crypto devices like the Crypto Express cards already have a lot of what you'd think of as Tempest protection. In fact, the FIPS 140 Level 4 evaluation (which all Crypto Express cards pass) includes verification that those kinds of side-channel attacks are prevented. --

Re: ICSF and millions of RSA keys

2018-06-28 Thread Todd Arnold
Here are the answers from my friends on the ICSF development team. >1. Is it good idea to have millions of keys in PKDS? Would it be a >problem for ICSF? VSAM limits seem to be not a problem, but maybe ICSF >have some bottlenecks or limitations. There will be no problem for ICSF to store 2 to 3

Re: ICSF and millions of RSA keys

2018-06-28 Thread Todd Arnold
I sent this question on to someone on the ICSF development team. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Re: Intel Chip flaw

2018-01-05 Thread Todd Arnold
Remember that in order to exploit these, you need to be able to load and run your own code next to the code you're trying to attack. You generally can't do that in embedded devices like printers, routers, POS terminals, etc. Also, these are attacks that apply to systems running multiple proces

Re: Looking for mainframe shops Lexington/Cincinnati

2017-08-29 Thread Todd Arnold
I asked some IBM coworkers of mine who are located in Lexington. Here's what they had to say: "One person thought of the University of Kentucky here in Lexington. Also, in Central Kentucky, I know of NTT Data (Frankfort), Booz Allen (Radcliff), and Humana (Louisville). Louisville/Cincinnati pr

Re: Vector processing instructions

2017-08-07 Thread Todd Arnold
I got this answer from someone else at IBM, who is an expert in the vector instructions: "Currently to convert a 128-bit singed/unsigned integer in a vector register to a packed decimal value you must store the value to memory and use the standard integer conversion instruction CVBG to convert 6

Re: Customer is Using CPACF (Crypto) purchased Crypto Express

2017-06-20 Thread Todd Arnold
Right - the CPACF Protected Keys are *very* secure and we were very happy with our ability to add that feature. Unfortunately, for some applications (such as payment card systems), the standards require a "Secure Cryptographic Device" (SCD) like an HSM that has advanced active tamper detection

Re: Customer is Using CPACF (Crypto) purchased Crypto Express

2017-06-19 Thread Todd Arnold
So, the discussion about ICSF is not meaningful - ICSF runs on z/OS, and you're not using z/OS in this case. In general, the choice between CPACF and CEX is fairly straightforward. - If the function(s) you need can be done with CPACF, then use CPACF. It is faster than CEX for everything it

Re: Customer is Using CPACF (Crypto) purchased Crypto Express

2017-06-14 Thread Todd Arnold
As Phil said: > (arguably the firmware is slightly less secure than the tamper-resistant HSM, > but the memory > used in the firmware to hold that key is protected-it's apparently not even > visible in HMC dumps) That is correct. The memory where the key is held is associated with the CPACF h

Re: Customer is Using CPACF (Crypto) purchased Crypto Express

2017-06-14 Thread Todd Arnold
Since I design some of this stuff, I can help clarify - but others have already done a pretty good job of explaining the various alternatives. What I'd like to ask is what you are actually trying to do? What is the reason for installing the Crypto Express and trying to use it instead of or in

Re: ICSF -CKDS Question

2017-04-20 Thread Todd Arnold
I asked one of the ICSF developers about this. Here is his reply: -- There is no way to create a new entry in the CKDS from an existing entry using KGUP. The way I would do it would be to write a program to do the following: • Call CSNBKRR2 to get the key token • Call CSNB

Re: GREAT presentation on the history of the mainframe

2017-03-24 Thread Todd Arnold
> 303x external channels (channel director) was 158 engine with integrated > channel microcode (and no 370 microcode). 360 processors with special microcode were used in a number of things. Early in my career, I worked on development of the IBM 3890 high-speed check sorter. (https://en.wikiped

Re: ComputerWorld Says: Cobol plays major role in U.S. government breaches

2017-03-21 Thread Todd Arnold
A good example of how z System is keeping up with encryption and making it even easier to use can be seen in the brief summary in "Preview: IBM z/OS Version 2 Release 3" at http://www-01.ibm.com/common/ssi/cgi-bin/ssialias?subtype=ca&infotype=an&supplier=897&letternum=ENUS217-085 . It has this

Re: ComputerWorld Says: Cobol plays major role in U.S. government breaches

2017-03-20 Thread Todd Arnold
Gee, I've been developing crypto technology for 30+ years that runs in those environments - so it's certainly news to me that it can't be done :-) Looking at the ICSF Application Programmer's Guide, which defines the ways most z/OS applications get cryptographic services, I see this: ICSF ca

Re: ICSF Question

2017-02-20 Thread Todd Arnold
You might want to look at the IBM Crypto Analytics Tool (CAT), offered by the excellent IBM crypto team in Denmark. It is intended to analyze your crypto system and provide a variety of reports on many things you might need for system management, compliance, etc. (including things having to do

Re: Blockchain

2017-01-27 Thread Todd Arnold
Kirk, you don't need to program the SHA-256 algorithm in software - it's available as a hardware instruction using CPACF. I don't have performance numbers handy for SHA-256, but you can see SHA-512 performance in this paper: http://www.ibm.com/common/ssi/cgi-bin/ssialias?subtype=WH&infotype=SA

Re: Blockchain

2017-01-27 Thread Todd Arnold
> z/Series machines are not geared towards floating point operations the way > commodity GPUs, FPGAs, or purposely built BitCoin miners are. Remember that the main thing you need to do for bitcoin mining are hashing operations. The z machines have the hash algorithms built in to the CPACF hard

Re: 3DES encryption using ICSF callable services

2015-11-20 Thread Todd Arnold
> Actually ICSF provides both open and secure key encryption services. Yes - mainly, those were added so that applications would have a way to use ICSF for clear-key encryption with the CPACF. Those were not originally a part of CCA, and are not supported in the HSM cards (Crypto Express, 476x)

Re: 3DES encryption using ICSF callable services

2015-11-19 Thread Todd Arnold
One of the fundamental design points for CCA is that keys are protected. Once they are inside the CCA system, they are always encrypted if they are outside the physically secure HSM module. Thus, most crypto functions in the CCA API ("verbs") only accept keys in encrypted form - wrapped with t

Re: 3DES encryption using ICSF callable services

2015-11-11 Thread Todd Arnold
I'd like to point out that 2-key TDES is still the standard for banking cryptography and that almost nothing in payment card or related security uses anything else - in fact, some standards (like DUKPT) do not support 3-key TDES at all. The confusion is because the best attacks on 2-key TDES r

IBM z Systems Security Conference announcement

2015-06-05 Thread Todd Arnold
I received an email announcing this event and thought some readers might be interested. Here is the note: --- Dear All, Join us for the IBM z Systems Security Conference which will be held September 27th to October 2nd at the IBM Client Center Montpellier, France. Analytics,

Re: CryptoExpress4S - how many domains?

2015-05-26 Thread Todd Arnold
> 16 was the number for a long time. Also, why 85? 5 x 17? Where did the > extra 1 come from? I would have expected ... 5 * 16 = 80 The number of domains architecturally supported in the CEX5 card itself is actually 256, which is of course a nice power of 2. However, that is more than that z

Re: PCI DSS compliance for z/OS

2015-05-19 Thread Todd Arnold
> I think much of the problem is with credit card numbers themselves. There are > only ~10**16 possible credit card numbers... Actually, it's much worse than that. You can't encrypt all of the PAN for a credit card. Typically, the first part (the BIN) is required in cleartext in order to rout

Re: PCI DSS compliance for z/OS

2015-05-19 Thread Todd Arnold
Phil Smith wrote: > ... and when decommissioning hardware-no more "How many DSEs should we > do? or "Should we take the drives out back, shoot ‘em with a 12-gauge, > and then drop ‘em in the ocean?". Actually, there is a much more interesting corollary to this scenario. If you have a drive th

Re: PCI DSS compliance for z/OS

2015-05-18 Thread Todd Arnold
The article you referenced seems to assume whole-disk encryption is always implemented using software on your computer, since it says "the operating system has the decryption key to access the disk". That is not true, of course, for self-encrypting disk drives (or tape drives) where the encrypt

Re: ICSF and EMV

2015-05-11 Thread Todd Arnold
IBM is aware of the difficulty figuring out what combination of CCA verbs to use for each EMV function, and we are working on things to make this easier. However, all of the necessary functions are definitely there in CCA - we have many customers who process EMV transactions and perform EMV key

Re: ICSF Without Crypto Card?

2013-09-23 Thread Todd Arnold
ou got from it earlier become invalid. This is in contrast with the "full" protected mode which uses a CEX card, and where your keys are stored in CEX key tokens that are still good after restarts. Both are good, valid approaches, but obviously the "full" approach is approp

Re: ICSF Without Crypto Card?

2013-09-23 Thread Todd Arnold
keys is under the CEX master keys. Those can't be used, of course, unless you have the CEX. Thus, a CEX is required in order to use protected-mode CPACF. If you take a clear key and import it to protected mode, the result is a protected key that cannot be used without having a CEX

Re: ICSF Without Crypto Card?

2013-09-23 Thread Todd Arnold
introduced 2009 – Protected Key CPACF 2009 - Crypto Express3 (4765 card) replaces PCIXCC 2012 - Crypto Express4S - same crypto card as Crypto Express3, but packaged differently for new mainframes Todd Arnold IBM Cryptographic Coprocessor Development Charlotte, NC

Re: ICSF Without Crypto Card?

2013-09-20 Thread Todd Arnold
ocURL=/common/ssi/rep_ca/3/649/ENUSA00-0293/index.html&lang=en&request_locale=en for one of the announcement notices, which says in part: "New for 2000, the IBM PCI Cryptographic Coprocesser (PCICC) is an orderable feature that adds additional cryptographic function and cryptographi

Re: ICSF master keys at DR site

2013-05-15 Thread Todd Arnold
e system, not just the LPAR that issued the disable. -- Todd Arnold -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Re: ICSF master keys at DR site

2013-05-14 Thread Todd Arnold
quires the participation of several smart card holders. ------- Todd Arnold -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Re: Crypto Facility performance.

2013-04-30 Thread Todd Arnold
t from step 1 Todd Arnold -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Re: Crypto Facility performance.

2013-04-29 Thread Todd Arnold
ork on some of those standards, and I'm constantly fighting this battle - some times I succeed, and some times I don't. Todd Arnold -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@li

Re: Crypto Facility performance.

2013-04-29 Thread Todd Arnold
using IBM copiers for personal purposes. > (this was even before DES, coppersmith was still down at > harvard) I really miss being able to contact Don to get quick and accurate answers to crypto questions. Todd Arnold

Re: Crypto Facility performance.

2013-04-26 Thread Todd Arnold
which means a physically secure, tamper-detecteing device like the Crypto Express. This is what the auditors are measuring the systems against. Todd Arnold -- For IBM-MAIN subscribe / signoff / archive access instructions, send em

Re: Crypto Facility performance.

2013-04-25 Thread Todd Arnold
quired functions and where it's being used for something where your auditor won't say "no" - and in those cases, you have to use the Crypto Express. Protected Key is an incredibly fast solution that really does have very g

Re: Crypto Facility performance.

2013-04-24 Thread Todd Arnold
the 4753, which contained the 4755 card and channel-attached to mainframes running MVS. (and yes, I worked on those - in addition to the research work that preceded them. Thanks, Phil for mentioning my history on this!) Todd Arnold

Re: Crypto Facility performance.

2013-04-23 Thread Todd Arnold
te "modes" on the CEX itself - as far as it's concerned, you can use both modes at the same time. However, the System z architecture makes a distinction between the two modes and only lets you use one of them on a given CEX card, according to how you have configured that c

Re: Crypto Facility performance.

2013-04-22 Thread Todd Arnold
us to send more data to the crypto card at a time - meaning there are fewer calls to the card than on System z, where it is chopped into smaller packets. Todd Arnold IBM Cryptographic Coprocessor development -- For IBM-MAIN subs

Re: IBM Mainframe (1980's) on You tube

2013-03-20 Thread Todd Arnold
Two points... (1) Remember that when IBM invented CCA back in the late 1980s, there really were no other HSMs - thus, there were no other crypto architectures in the banking world to be "compatible" with. I suppose other vendors who came along and developed HSMs could have adopted CCA, but th

Re: IBM Mainframe (1980's) on You tube

2013-03-17 Thread Todd Arnold
). You can find some info on the cards and CCA for those systems starting at http://www.ibm.com/security/cryptocards. - Todd Arnold -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv

Re: What is the justification for not using Trusted Key Entry (TKE) workstation?

2013-03-14 Thread Todd Arnold
f security is appropriate (or required) in your particular application. There is no question that TKE is much more secure, but for many people the TSO panels are perfectly acceptable. Todd Arnold Senior Technical Staff Member (STSM) IBM Cryptographic Coprocessor Development (arno...@

Re: Secure Encryption Keys vs Protected Keys

2013-03-14 Thread Todd Arnold
features that do that. Finally, if you are doing any kind of bank card or payments processing, or some other operations, there are standards that make it mandatory that you use an HSM like the CEX cards. Even though protected key CPACF is very secure, it does not meet the rules stated in tho

Re: IBM Mainframe (1980's) on You tube

2013-03-14 Thread Todd Arnold
included the 4753. The 4753 was the first product to offer the CCA architecture, and it is the ancestor of all of the other crypto processors such as the Crypto Express cards. Todd Arnold -- For IBM-MAIN subscribe / signoff