Cp Assist For Cryptographic Functions; The Cryptographic Coprocessor Cpacf - IBM z13s Technical Manual

Table of Contents

Advertisement

6.4 CP Assist for Cryptographic Functions

As already mentioned, attached to every PU on an SCM in a CPC of a z13s server are two
independent engines, one for compression and one for cryptographic purposes, as shown in
Figure 6-4. This cryptographic coprocessor, called the CPACF, is not an HSM and is therefore
not suitable for handling algorithms that use secret keys. However, the coprocessor can be
used for cryptographic algorithms that use clear keys or protected keys. The CPACF is
working synchronously to the PU, which means that the owning processor is busy when its
coprocessor is busy. CPACF provides a fast device for cryptographic services.
Figure 6-4 The cryptographic coprocessor CPACF
The CPACF offers a set of symmetric cryptographic functions that enhance the encryption
and decryption performance of clear key operations. These functions are for SSL, virtual
private network (VPN), and data-storing applications that do not require FIPS 140-2 Level 4
security.
CPACF is designed to facilitate the privacy of cryptographic key material when used for data
encryption through key wrapping implementation. It ensures that key material is not visible to
applications or operating systems during encryption operations. For more information, see
6.4.2, "CPACF protected key" on page 209
The CPACF feature provides hardware acceleration for DES, Triple-DES, AES-128, AES-192,
AES-256 (all for clear and protected keys) as well as SHA-1, SHA-256, SHA-384, SHA-512,
PRNG and DRNG (only clear key) cryptographic services. It provides high-performance
hardware encryption, decryption, hashing, and random number generation support.
The following instructions support the cryptographic assist function:
KMAC
KM
KMC
KMF
KMCTR
KMO
KIMD
KLMD
PCKMO
Compute Message Authentic Code
Cipher Message
Cipher Message with Chaining
Cipher Message with CFB
Cipher Message with Counter
Cipher Message with OFB
Compute Intermediate Message Digest
Compute Last Message Digest
Provide Cryptographic Key Management Operation
Chapter 6. Cryptography
207

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents