z/OS Cryptographic Services ICSF Application Programmer's Guide
Previous topic | Next topic | Contents | Index | Contact z/OS | Library | PDF


Using the Ciphertext Translate Callable Service

z/OS Cryptographic Services ICSF Application Programmer's Guide
SA22-7522-16

Restriction: The ciphertext translate callable service does not work in CDMF-only systems (see System Encryption Algorithm). The ciphertext translate callable service does not work on the PCI X Cryptographic Coprocessor, Crypto Express2 Coprocessor, or Crypto Express3 Coprocessor.

This topic describes a scenario using the encipher, ciphertext translate, and decipher callable services with four network nodes: A, B, C, and D. You want to send data from your network node A to a destination node D. You cannot communicate directly with node D, and nodes B and C are situated between you. You do not want nodes B and C to decipher your data.

At node A, you use the Encipher callable service. Node D uses the Decipher callable service.

Node B and C will use the ciphertext translate callable service. Consider the keys that are needed to support this process:

  1. At your node, generate one key in two forms: OPEX DATA DATAXLAT
  2. Send the exportable DATAXLAT key to node B.
  3. Node B and C need to share a DATAXLAT key, so generate a different key in two forms: EXEX DATAXLAT DATAXLAT.
  4. Send the first exportable DATAXLAT key to node B.
  5. Send the second exportable DATAXLAT key to node C.
  6. Node C and node D need to share a DATAXLAT key and a DATA key. Node D can generate one key in two forms: OPEX DATA DATAXLAT.
  7. Node D sends the exportable DATAXLAT key to node C.

The communication process is shown as:

Node:       A              B                     C                 D

Callable
Service: Encipher  Ciphertext Translate  Ciphertext Translate   Decipher

Keys:     DATA      DATAXLAT  DATAXLAT    DATAXLAT  DATAXLAT     DATA

Key Pairs: |____ = ____|         |____ = ____|         |____ = ____|
 

Therefore, you need three keys, each in two different forms. You can generate two of the keys at node A, and node D can generate the third key. Note that the key used in the decipher callable service at node D is not the same key used in the encipher callable service at node A.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014