Cryptographic Basics
Project and Program:
Enterprise Data Center,
Security and Compliance
Tags:
Proceedings ,
2014 ,
SHARE in Pittsburgh 2014
This session will introduce the basic functionality that cryptography provides and how it can be used to secure your environment. We will talk about the difference between symmetric and asymmetric algorithms and why you need both. We’ll also consider hashing algorithms and how they can provide integrity. And we’ll touch briefly on the ATM PIN support that secures credit card Personal Identification Numbers. We will then relate the functionality back to the crypto infrastructure on System z, so you can understand which technology provides which functionality.-Greg Boyd-Mainframe Crypto
Back to Proceedings File Library