z/OS Cryptographic Services ICSF Application Programmer's Guide
Previous topic | Next topic | Contents | Index | Contact z/OS | Library | PDF


Functions of the Symmetric Cryptographic Keys

z/OS Cryptographic Services ICSF Application Programmer's Guide
SA22-7522-16

ICSF provides functions to create, import, and export AES, DES, and HMAC keys. This topic gives an overview of these cryptographic keys. Detailed information about how ICSF organizes and protects keys is in z/OS Cryptographic Services ICSF Administrator’s Guide.

ICSF supports two types of symmetric key tokens: fixed-length and variable-length. In fixed-length key tokens, key type and usage are defined by the control vector. In variable-length key tokens, the key type and usage are defined in the associated data section. The control vector and associated data section are cryptographically bound to the encrypted key value in the token.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014