z/OS Cryptographic Services ICSF Application Programmer's Guide
Previous topic | Next topic | Contents | Index | Contact z/OS | Library | PDF


Decimalization Tables

z/OS Cryptographic Services ICSF Application Programmer's Guide
SA22-7522-16

Decimalization tables can be loaded in the coprocessors to restrict attacks using modified tables. The management of the tables requires a TKE Workstation.

Clear PIN Generate (CSNBPGN and CSNEPGN), Clear PIN Generate Alternate (CSNBCPA and CSNECPA), Encrypted PIN Generate (CSNBEPG and CSNEEPG), and Encrypted PIN Verify (CSNBPVR and CSNEPVR) callable services will make use of the stored decimalization tables.

The ANSI X9.8 PIN - Use stored decimalization tables only access control point is used to restrict the use of tables. When the access control point is enabled, the table supplied by the callable service will be compared against the active tables stored in the coprocessor. If the supplied table doesn't match any of the active tables, the request will fail.

A TKE workstation (Version 7.1 or later) is required to manage the PIN decimalization tables. The tables must be loaded and then activated. Only active tables are checked when the access control point is enabled.

Note:
ICSF routes work to all active coprocessors based on work load. All coprocessors must have the same set of decimalization tables for the decimalization table access control point to be effective.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014