I am a mainframe techie working in mainframe for 5.5 years in India and in UK. For last 2.5 years I have been involved in protecting sensitive data through cryptography woking for 2-3 major UK banks. If you have any comments/suggestions/questions on my stuff below juz fire an email mojozmania@gmail.com.
Here is a presentation for you on Introduction To Cryptography. Enjoy !!
Cryptography - Lets meet the Crypto Life
This is where I define and understand the Crypto basics. These crypto idea/algorithms/standards can then be implemented on any hardware.
Various TERMS:
Various TERMS:
- Encryption & Decryption
- Symmetric Key Cryptography
- Assymmetric Key Cryptography
- DES
- AES
- Block Cipher
- Block Cipher Modes Of Operation
- IV - Initialization Vector
- ECB
- CBC - Ciher Block Chaining
- CFB - Cipher Feedback
- OFB - Output Feedback
- PKA
- PKCS - (Public key Cryptography Standards)
- RSA - (Rivest-Shamir-Adleman)
- DSS - (Digital Signature Standard)
- SHA - (Secure Hash Algorithm)
- SHA Types: SHA-0, SHA-1, SHA-256 etc.
- MAC - (Message Authentication Codes)
- MAC Types - UMAC, HMAC, CMAC
- PIN Blocks
- Others - About HASH Functions & HASH Algorithms.
RSA EXAMPLE: This is a good worked example on how the RSA encryption and decryption works.
ATALLA
Here goes all my research on Atalla.
To start with here is the link to HP Atalla NSP (Network Security Processor) - www.atalla.com.
A good introduction to Atalla NSP is here. This talks about the new HP Atalla Ax150 NSP product line, a successor of Atalla Ax100 NSP. Hew 'x' can be either 8 or 9 or 10 corresponding to entry-level, mid-range and high-end model respectively.
A while paper by HP which titles "Combining Key Management with triple-DES to maximize security" talks about the vunerability of 3-DES as a way to protect data. It is already known that with the computing power available DES was already broken at the start of this centuary.
To start with here is the link to HP Atalla NSP (Network Security Processor) - www.atalla.com.
A good introduction to Atalla NSP is here. This talks about the new HP Atalla Ax150 NSP product line, a successor of Atalla Ax100 NSP. Hew 'x' can be either 8 or 9 or 10 corresponding to entry-level, mid-range and high-end model respectively.
A while paper by HP which titles "Combining Key Management with triple-DES to maximize security" talks about the vunerability of 3-DES as a way to protect data. It is already known that with the computing power available DES was already broken at the start of this centuary.
IBM Crypto Life
My research on IBM stuff goes here. The List of IBM Stuff..
- PCICC card (IBM 4758 card)
- PCIXCC (IBM 4764 card - PCI Extended Cryptographic Co-processor)
- CEX2C (Crypto Express 2 Coprocessor)
- CEX2A (Crypto Express 2 Accelator)
- CPACF (CP Assist For Cryptographic Functions)
- ICSF (Integrated Cryptographic Service Facility)
- ICRF (Integrated Cryptographic Facility)
- TKE (Trusted Key Entry)
- 'EZASOKET' command for TCP/IP communication
ICSF - Integrated Cryptographic Service Facility
- Document on ICSF Mainframe panel. These screenshots are from a mainframne I worked on.
- KGUP - Key Generator Utiliy Program
EZASOKET:
- A good link to a lot of Mainframe and Socket docs and ppts. Here.
- A very good PPT on TCP/IP socket programming on MVS. Socket, Socket, Who has the Socket !! . This explaing the basics and how to program in COBOL, ASSEMBLER etc. Impressing must read.
- There is more information in the MVS manual--> A Beginner’s Guide to MVS TCP/IP Socket Programming GG24-2561-00 (pdf version not available). More links present in the PDF which reads EZA Sockets - User Experience.
- Example: COBOL program. This demonstrates the use of EZASOKET. This particular program writes a HSM request on soket and listens for response.
IBM DKMS:- Distributed key Management System
- IBM page here.
- A good IBM RED book is Distributed Key Management System Installation and Customization Guide. Actually this is the only DKMS IBM book available online. The other manuals are not available directly to download but need to be requested. Pretty strange for IBM's product line manuals.
- IBM 4753 - Network Security Processor is used by DKMS.
- ICRF - Integrated Cryptographic Facility, a general key Management System.
- KMG Package - Key Mgmt Software package, for the DKMS Online Version. The KMG Package has 2 parts:
i) The first part maintains information on all of the DKMS host DB2 tables, and directs all requests related to IBM host environment cryptographic devices to the second part.
ii) The second part adds, lists, verifies and deletes keys in IBM 4753 NSP key storage and Integrated Cryptographic Feature CKDS. - PMV Package - DKMS MVS Crypto API Program Package
contains the API for terminals and ATMs. - Host DB2 tables - KMGxxxx
> total 12 tables
> e.g. KMG0004, KMG0214
IBM TKE - Trusted Key Entry
- This is a non mainframe based application having a good GUI which can be used for entering/manipulating keys on mainframe ICSF system.
- Current/latest version = V5.2 (as of Dec 2005). Version 5+ is required on z9 and above machines.
- Good Docs =
- TKE requires the IBM 4764 Cryptographic Adapter
- CNM = Cryptographic Node Management Utility
- CNI = Cryptographic Node batch Initialization
OTHERS:
- IBM Redbook on TCP/IP supposdly good - TCP/IP Tutorial and Technical Overview.
- IBM Redbook on BASE24 - A Guide to the ACI Worldwide BASE24-eps on z/OS.
- Good PPT explaing with good diagrams but is old. Still good to know how CCA architecture started - zSeries Cryptographic Coprocessors.
Crypto Secret Links
My study and research on IBM's Crypto Cards (PCICC, PCIXCC (4764 Card), CEX2C, CPACF etc), software part ICSF(Integrated Cryptographic Service Facility), Thales HSMs (Hardware Security Module esp HSM 8000), Atalla NSP (network security processor) etc.
General:
General:
- Links to different Crpto Hardware. Here.
- Mike has done some good research. Saving his page. Click here.How about Godzilla Crypto tutorial. By Peter Gutmann.
- All ICSF manuals. Here. I prefer to see the z/OS version and not OS390.
- IBM Crypto Cards. Here.
- PCIXCC or IBM 4764 card. Here.
- A good IBM research Report on Building s High-Performance, Programmable Secure Coprocessor- RC21102.
- PPT - Using Cryptography on z/OS - here.
This is a simple easy to understand presentation discussing about z/OS Crypto API, ICSF, SSL, OCSF, PKI Services and Kerberos.
HSMs.
HSM stuff over the internet is difficult to find. Thanks to 2 of my collegues for giving me the 1270A351 HSM-8000 Command Reference Manual Issue 6.1 March 2007 which helped me in understanding the HSM Host commands (API requests and response). It also gives a good view of various PIN BLOCK formats. This is located at my storage area. :)
- HSM Basics 1 - Good Article. Here.
- HSM Basics 2 - A lot of clarification on the Cryptographic Keys like MFK, KEK, BDK, PVK etc. Here.
- Overview of HSM - By SANS. Here.
- Into to Thales HSM 8000. Here. The same info in a pdf by Thales here.
- PDF Article - Maximize the Use of HSM. Here.
- PDF on HSM 8000 new base software V3.1 - here.
Others:
- Vector Microprocessors for Cryptography - By Jean & Fournier
TECHNICAL REPORT - UNIVERSITY OF CAMBRIDGE
This is a report which I would waana go through when I have time. Pretty deep.Here.
Subscribe to:
Posts (Atom)