with Tags: crypto X
Caroline Exum email@example.com Tags: db2 racf security systemz crypto zenterprise z/os 3,381 Visits
By Mark Nelson, Senior Software Engineer, IBM z/OS Security Server Design and Development Team I suspect that everyone who is in information security has, at one time or another heard questions like this: Is it perfectly safe to <insert...
from Blog: IBM Mainframe InsightsModified by Caroline Exum firstname.lastname@example.org
Pratin Ashtekar email@example.com Tags: eysha_powers system_z_software crypto z/os system_z systemz security 3,271 Visits
By Eysha Powers, Cryptographic Software Developer, IBM It has always been interesting to me how key strength is affected not only by key size but also by the algorithm. TDES and AES symmetric keys both provide a means of encrypting and decrypting data...
from Blog: IBM Mainframe Insights