Previous topic |
Next topic |
Contents |
Index |
Contact z/OS |
Library |
PDF
Strength of Hardware Cryptography z/OS Cryptographic Services ICSF Administrator's Guide SA22-7521-17 |
|
Cryptographic algorithms can be implemented in both software and specialized hardware. A hardware solution is often desirable because it provides these advantages:
If a data security threat comes from an external source, a software implementation of the cryptographic algorithm might be sufficient. Unfortunately, however, much fraud originates with individuals within the organization (insiders). As a result, specialized cryptographic hardware can be required to protect against both insider and outsider data security threats. Well-designed hardware can:
|
Copyright IBM Corporation 1990, 2014
|