Skip to main content

S/390 Crypto PCI Implementation Guide

An IBM Redbooks publication

Note: This is publication is now archived. For reference only.

thumbnail 

Published on 27 June 2000, updated 14 July 2000

  1. .PDF (2.1 MB)

 Order hardcopy
Share this page:   

ISBN-10: 0738417017
ISBN-13: 9780738417011
IBM Form #: SG24-5942-00


Authors: Moon Kim

menu icon

Abstract

This IBM Redbooks publication is designed to help you understand and implement the S/390 Cryptographic PCICC card.

Although this book is focused on the enablement of the S/390 PCICC product, cryptography and the available services on S/390 are also discussed and explained, with special attention given to the new Trusted Key Entry (TKE) workstation. Reader familiarity with the previous S/390 cryptography-related book: Exploiting S/390 Hardware Cryptography with TKE, SG24-5455, is assumed.

Table of Contents

Chapter 1 Introduction

Chapter 2 PCICC product overview

Chapter 3 Planning

Chapter 4 ICSF installation, configuration and startup

Chapter 5 Customizing PCICC and CCF using a TKE V3.0

Chapter 6 Support functions

Chapter 7 Exploiting the PCICC

Appendix A Support functions: ICSF services

Appendix B TKE Host TCP/IP server setup

 

Others who read this also read