The IBM 4769[1] PCIe Cryptographic Coprocessor is a hardware security module[2] (HSM)[3] that includes a secure cryptoprocessor implemented on a high-security, tamper resistant, programmable PCIe board. Specialized cryptographic electronics, microprocessor, memory, and random number generator housed within a tamper-responding environment provide a highly secure subsystem in which data processing and cryptography can be performed. Sensitive key material is never exposed outside the physical secure boundary in a clear format.
The IBM 4769 is designed to meet FIPS PUB 140-2 Level 4,[4] the highest level of certification achievable for commercial cryptographic devices. The 4769 is part of IBM's pervasive encryption and enterprise security schemes.[5] The IBM 4769 data sheet[6] describes the coprocessor in detail.
IBM supplies two cryptographic-system implementations:
- The PKCS#11[7] implementation, called IBM Enterprise PKCS11 (EP11),[8] creates a high-security solution for application programs developed for this industry-standard API.
- The IBM Common Cryptographic Architecture (CCA)[9] implementation provides many functions of special interest in the finance industry, extensive support for distributed key management, and a base on which custom processing and cryptographic functions can be added.
Applications may include financial PIN transactions, bank-to-clearing-house transactions, EMV transactions for integrated circuit (chip) based credit cards, and general-purpose cryptographic applications using symmetric key algorithms, hashing algorithms, and public key algorithms.
The operational keys (symmetric or asymmetric private (RSA or Elliptic Curve)) are generated in the coprocessor and are then saved either in a keystore file or in application memory, encrypted under the master key of that coprocessor. Any coprocessor with an identical master key can use those keys. See elliptic curve cryptography (ECC) for more information about ECC. New hardware in the 4769 adds support to accelerate the Elliptic Curves 25519 and Ed448, as well as the format preserving encryption (FPE) algorithms FF1, FF2, FF2.1, FF3, and FF3.1.
IBM supports the 4769 on certain IBM Z mainframes as Crypto Express7S (CEX7S) - feature codes 0898 and 0899.[10] The 4769 / CEX7S is part of IBM's support for pervasive encryption[11][12] and drive to encrypt all data.
References
- ↑ "IBM 4769 Overview". www.ibm.com. Retrieved 2020-02-18.
- ↑ Attridge, Jim (2002-01-14). "Overview of Hardware Security Modules". SANS Institute. Retrieved 2020-02-18.
- ↑ "Understanding Hardware Security Modules (HSMs)". Cryptomathic.com. 2017-09-13. Retrieved 2020-03-27.
- ↑ "CSRC Modules in process list". 11 October 2016. Retrieved 2020-02-18.
- ↑ "IBM enterprise security". IBM. Retrieved 2020-02-18.
- ↑ "IBM CEX7S / 4769 Cryptographic Coprocessor (HSM)" (PDF). Retrieved 2020-02-18.
- ↑ "PKCS#11: Cryptographic Token Interface Standard". Retrieved 2020-02-18.
- ↑ "IBM CEX7S / 4769 EP11". IBM. Retrieved 2020-02-18.
- ↑ "IBM CEX7S / 4769 CCA". IBM. Retrieved 2020-02-18.
- ↑ IBM z15 Technical Introduction. 30 September 2016. Retrieved 2020-02-18.
- ↑ "Encryption solutions on IBM Z". IBM. Retrieved 2020-02-18.
- ↑ "Technical resources for pervasive encryption for IBM Z". IBM. 16 July 2018. Retrieved 2020-02-18.
External links
General overview of cryptography: https://www.garykessler.net/library/crypto.html
These links point to various relevant cryptographic standards.
ISO 13491 - Secure Cryptographic Devices: https://www.iso.org/standard/61137.html
ISO 9564 - PIN security: https://www.iso.org/standard/68669.html
ANSI X9.24 Part 1: Key Management using Symmetric Techniques: https://webstore.ansi.org/RecordDetail.aspx?sku=ANSI+X9.24-1-2017
ANSI X9.24 Part 2: Key Management using Asymmetric Techniques: https://webstore.ansi.org/RecordDetail.aspx?sku=ANSI+X9.24-2-2016
FIPS 140-2: https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.140-2.pdf
Payment Card Industry (PCI) PIN Transaction Security (PTS): Hardware Security Module (HSM) Modular Security Requirements: search this site: https://www.pcisecuritystandards.org/document_library