Previous topic |
Next topic |
Contents |
Index |
Contact z/OS |
Library |
PDF
Wrapping Methods for Symmetric Key Tokens z/OS Cryptographic Services ICSF Application Programmer's Guide SA22-7522-16 |
|
This section explains how symmetric keys are wrapped with master and key-encrypting keys. For DES and AES keys, two methods are detailed. These use the 64-byte token. HMAC keys will use a variable length token with associated data and the payload wrapping method. In the future, all symmetric keys will be able to use the variable length token and the payload wrapping method. |
Copyright IBM Corporation 1990, 2014
|