S/390 Crypto PCI Implementation Guide

An IBM Redbooks publication

Note: This is publication is now archived. For reference only.

Published 27 June 2000, updated 14 July 2000

cover image

ISBN-10: 0738417017
ISBN-13: 9780738417011
IBM Form #: SG24-5942-00
(178 pages)

More options

Rate and comment

Authors: Moon Kim


This IBM Redbooks publication is designed to help you understand and implement the S/390 Cryptographic PCICC card.
Although this book is focused on the enablement of the S/390 PCICC product, cryptography and the available services on S/390 are also discussed and explained, with special attention given to the new Trusted Key Entry (TKE) workstation. Reader familiarity with the previous S/390 cryptography-related book: Exploiting S/390 Hardware Cryptography with TKE, SG24-5455, is assumed.

Table of contents

Chapter 1 Introduction
Chapter 2 PCICC product overview
Chapter 3 Planning
Chapter 4 ICSF installation, configuration and startup
Chapter 5 Customizing PCICC and CCF using a TKE V3.0
Chapter 6 Support functions
Chapter 7 Exploiting the PCICC
Appendix A Support functions: ICSF services
Appendix B TKE Host TCP/IP server setup

Others who read this publication also read

Follow IBM Redbooks

Follow IBM Redbooks