Using AES, DES, and HMAC cryptography and verbs

You can use AES, DES, and HMAC cryptographic functions that CCA provides. CCA also provides cryptographic key functions, and you can use CCA to build key tokens.

The CEX*C protects data from unauthorized disclosure or modification. This coprocessor protects data stored within a system, stored in a file off a system on magnetic tape, and sent between systems. The coprocessor also authenticates the identity of customers in the financial industry and authenticates messages from originator to receiver. The coprocessor uses cryptography to perform these functions.

The CCA API for the coprocessor provides access to cryptographic functions through verbs. A verb is a routine that receives control using a function call from an application program. Each verb performs one or more cryptographic functions, including:
  • Generating and managing cryptographic keys
  • Enciphering and deciphering data with encrypted keys using either the U.S. National Institute of Standards and Technology (NIST) Data Encryption Standard (DES) or Advanced Encryption Standard (AES)
  • Re-enciphering text from encryption under one key to encryption under another key
  • Encoding and decoding data with clear keys
  • Generating random numbers
  • Ensuring data integrity and verifying message authentication
  • Generating, verifying, and translating personal identification numbers (PINs) that identify a customer on a financial system