Cryptographic hardware
In this chapter we describe how the System z cryptographic hardware and its functions can be used to provide value to workloads running on z/Linux.
For many years IBM has delivered products that implement cryptographic functions in specialty hardware. The functions implemented in hardware are typically a subset of those that can be utilized in software. The benefits of using hardware range to improved security, increased entropy, offloading cycles from the CP, and even acceleration. In recent years IBM has shipped the following ...
Get Security for Linux on System z now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.