This is something like what we did as a clearing house with some banks many, many years ago.

II may have some doc I wrote up for myself, I"ll see if I can find it, but basically, yes,

we had a crypto co processor (that old yup) and created and stored a DES master key, created a transport key to company b, they imported our crypto key so they could decrypt our data, they in-turn did the same, we imported their key do we could decrypt their data,  step # 4 and 5  using AMS services.

very basic and not very secure these days, but we went the cheap route :(

Carmen

On 1/14/2022 11:59 AM, Radoslaw Skorupka wrote:
Let's assume two z/OS images and some data exchange.
One of possible methods is symmetric encryption.
However that requires key exchange.
I have the following idea:
1. Both sides create asymetric key.
2. Public keys are exported and exchanged.
3. One side encrypt symm key using public key of another side.
4. Second side decrypt symm key using it's own private key.

Does it make sense?
Any hints?
What services to use in steps 4. and 5. ?

--
/I am not bound to win, but I am bound to be true. I am not bound to succeed, but I am bound to live by the light that I have. I must stand with anybody that stands right, and stand with him while he is right, and part with him when he goes wrong. *Abraham Lincoln*/

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to