with Tags: crypto X
Caroline Exum firstname.lastname@example.org Tags: db2 racf security systemz crypto zenterprise z/os 3,321 Visits
By Mark Nelson, Senior Software Engineer, IBM z/OS Security Server Design and Development Team I suspect that everyone who is in information security has, at one time or another heard questions like this: Is it perfectly safe to <insert...
from Blog: IBM Mainframe InsightsModified by Caroline Exum email@example.com
Pratin Ashtekar firstname.lastname@example.org Tags: eysha_powers system_z_software crypto z/os system_z systemz security 3,200 Visits
By Eysha Powers, Cryptographic Software Developer, IBM It has always been interesting to me how key strength is affected not only by key size but also by the algorithm. TDES and AES symmetric keys both provide a means of encrypting and decrypting data...
from Blog: IBM Mainframe Insights