IBM 2 Computer Hardware User Manual


 
CCA Release 2.54
keys
activating 3-22
asymmetric 5-6
ciphering 5-7, 5-10
clear 5-16
control vectors 5-4
deactivating 3-22
deleting 3-22, 7-13, 7-21
double-length 5-6
exportable (EX) 5-4
exporting, asymmetric techniques 5-19
exporting, symmetric techniques 5-18
external 5-4
generating, DES 5-16
generating, RSA D-15
identifiers 5-14
importable (IM) 5-4
importing 5-18
importing, asymmetric techniques 5-19
installing 5-15
key management 5-1, 5-2
key-storage initialization 2-48, 2-50
key-usage keywords 5-6
label 5-12
label, content 7-2
labels
definition 5-14
length 5-12, 5-46
listing 7-22
managing 5-1, 5-2
master-key loading 2-59, 2-64
multiply-deciphered 5-4, 5-18
multiply-enciphered 5-3, 5-16
operational (OP) 5-4
parity 5-4
parts
generating 5-16
secure 5-15
processing
verbs 5-15
records
deleting 7-5, 7-13, 7-21
DES_Key_Record_Deleteservice 7-5
Key_Record_List service 7-7
Key_Record_Read service 7-9
Key_Record_Write service 7-10
listing 7-7, 7-15, 7-22
PKA_Key_Record_Delete service 7-13
PKA_Key_Record_List service 7-15
PKA_Key_Record_Read service 7-17
PKA_Key_Record_Write service 7-19
reading 7-9, 7-17
Retained_Key_Delete service 7-21
Retained_Key_List service 7-22
writing 7-10, 7-19
reenciphering 3-22
keys (continued)
RSA token sections B-6
secure-messaging 5-7
separation 5-4
storing 5-20
symmetric 5-5
transport B-1
types
and verbs 5-7
asymmetric 5-6
CIPHER 5-7
cipher-class keys 5-7
cryptographic-variable-class keys 5-8
CVARENC 5-8
CVARXCVL 5-8
CVARXCVR 5-8
DATA 5-7
DATA-class keys 5-7
DECIPHER 5-7
description 5-5
ENCIPHER 5-7
EXPORTER 5-7
IKEYXLAT 5-8
IMPORTER 5-7
IPINENC 5-8, 8-7
key-encrypting-key-class keys 5-7
key-generating-key-class keys 5-8
key-usage keywords 5-10
MAC 5-7
MAC-class keys 5-7
MACVER 5-7
OKEYXLAT 5-8
one-way key-distribution channels 5-6
OPINENC 5-8, 8-8
PIN security 8-7
PIN-class keys 5-8
PINGEN 5-8, 8-7
PINVER 5-8, 8-7
secure-messaging-class keys 5-7
symmetric 5-5
UKPTBASE 8-8
unique-key-per-transaction (UKPT) 8-37, 8-42
usage
bits 8-7
key form 5-17
key type 5-17
keywords 5-6
verification pattern 5-15
verifying 5-15
keywords, key-usage 5-6
L
LF (line feed) B-25
line feed (LF) B-25
Index X-15