IBM Common Cryptographic Architecture (CCA)

This topic describes the details about:

Symmetric key algorithms and processing

  • A clear key is not wrapped by another key.
  • A secure key is wrapped by a key.
  • An operational key is a secure key wrapped by a CCA master key.
  • A protected key is a secure key wrapped by the CPACF master key (HPSK).
DES and TDES
  • Data-encryption: Clear, operational, and CPACF protected keys.
  • Message authentication: Operational keys.
  • Key management: Operational keys.
  • Financial services: Operational keys.
AES
  • Data-encryption: Clear, operational, and CPACF protected keys.
  • Message authentication: Operational keys.
  • Key management: Operational keys.
  • Financial services: Operational keys.
HMAC
  • Message authentication: Clear and operational keys.

Asymmetric key algorithms and processing

  • A public key is always in the clear.
  • A clear private key is not wrapped by any key.
  • An operational private key of an asymmetric key is wrapped by a CCA master key.
RSA
  • Signature: Clear and operational keys.
  • Key management: Clear and operational keys.
EC
  • Signature: Clear, operational, and protected keys.
Dilithium
  • Start of changeSignature: Clear and secure keys.End of change
Start of changeML-DSAEnd of change
Start of change
  • Signature: Clear and secure keys.
End of change
Diffie-Hellman
  • Key management: Clear and operational keys.

Hashing algorithms and processing

SHA-1
CPACF only.
SHA-2
CPACF only.
SHA-3/SHAKE
CPACF only.
MD5
Software only.
RIPEMD-160
Software only.