z/OS Cryptographic Services ICSF Application Programmer's Guide
Previous topic | Next topic | Contents | Index | Contact z/OS | Library | PDF


Wrapping Methods for Symmetric Key Tokens

z/OS Cryptographic Services ICSF Application Programmer's Guide
SA22-7522-16

This section explains how symmetric keys are wrapped with master and key-encrypting keys. For DES and AES keys, two methods are detailed. These use the 64-byte token. HMAC keys will use a variable length token with associated data and the payload wrapping method. In the future, all symmetric keys will be able to use the variable length token and the payload wrapping method.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014