Using protected keys for high-speed encryption
The use of secure keys and protected keys in the Linux on Z data at-rest encryption process ensures that key material is not available or visible to unauthorized users at any time.
The Central Processor Assist for Cryptographic Functions (CPACF) wrapping key is used to rewrap (encrypt) a secure key after it is decrypted. The CPACF wrapping key is in a protected area of the hardware system area (HSA), which is not visible to the operating system or applications.
In this appendix, we show the key wrapping ...

Get Getting Started with Linux on Z Encryption for Data At-Rest now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.