advertise your website Login Registration
Submission Guidelines Recent Approved Articles Featured Articles
Submit Free Article
Home About Us Advertising GuideLines Do's & Don't T & C FAQ Contact us
  Home Computers & Technology Articles Software Articles
HostJinni Promotions
Articles Category
Arts & Entertainment
Computers & Technology
Food & Drink
Health & Fitness
Home & Family
Home Based Business
Home Improvement
Just for Women
Kids & Teens
News & Society
Online Business
Online Tickets
Real Estate
Reference and Education
Self Improvement
Sports & Recreation
Travel & Tourism
  Member Area
Author Login
Free Registration
Authors From Country
  Helpful Topics
How to Write Articles
Free Early Approval Tips
Why Article Submission
  Best of Webzine
Leader Board
Most Viewed Articles
Top Rated Articles
  WebZine Status
Total Articles -25402
Registered Authors - 4521
Featured Articles - 340
Articles added this
month - 212

Cryptography On Mainframe Systems

Mainframe system stores critical information of an organization; it communicates and coordinates with numerous devices that are connected to it in a network. Sensitive data of an organization stored in mainframe and flowing to and from it is in danger of external hackers and possibly few disloyal insiders. Under such situations, sharing critical data becomes a big challenge in any organization. Cryptography is a technique that helps in overcoming this challenge and helps secure privacy and integrity of critical data.

Need for cryptography

With increase in the usage of Internet and computerization of organizations, securing confidential data in an organization has become very essential. The following reasons strengthen the need of cryptography on mainframe systems.

Mainframes generally used in big organizations, have very big data repositories containing all kinds of information including critical, confidential information and business logic. With no assurance of all honest people in the network, cryptography has become a need for mainframe system in order to protect the sensitive data.

With drastic increase in the Internet usage and increase in the number of computerized services, organizations are looking forward to secure their data using cryptography.

What is cryptography?

Encryption: The process of converting plain text into cipher text (unreadable format) is called encryption.

Decryption: It is the process of converting cipher text into plain text.

"Cryptography" is an art of protecting the privacy and integrity of the information. Cryptography technique transforms the data into unreadable format (encryption) using mathematical formulae or a procedure and a key. A key is used to decrypt the encrypted data or vice versa.

Elements of cryptography

The two basic elements of cryptography are key and the algorithm.

Key: Key is used to encrypt or decrypt the data.

Algorithm: Algorithm is a logic or formula that is applied to data and the key in order to convert the plain text into cipher text.

There are two types of algorithms

• Symmetric algorithm - In this algorithm data is converted into cipher text (encryption) using a key and same key is used for converting cipher text into plain text (decryption).

• Asymmetric algorithm – In asymmetric algorithm, data is converted into cipher text using one key (public key) and the cipher text is converted back to the plain text using another key (private key).

There are hardware devices as well as software applications that perform cryptography.

Some of the cryptographic hardware devices are Cryptographic Accelerators, Hardware Security Modules (HSM), etc.

Cryptographic softwares that work on z/OS (operating system of a mainframe system) include

Integrated Cryptographic Services Facility (ICSF), Open Cryptographic Services Facility (OCSF), etc.

Benefits cryptography offers to an organization

Cryptography technique used in an organization offers

Authentication – Authentication involves confirming the identity of a user or a system to access the information. It is like permission.

Integrity – Integrity means the received data must be similar to the data that has been sent. In simple words means, "What we receive must be same as what you sent" or "What we sent must be same as what you received".

Protection – This is the basic idea of cryptography. Data is protected by encryption and keys.

Non-repudiation – Non-repudiation means ensuring or an agreement that the receiver and the sender of the message must be same as the sender and receiver who are claiming. There should not be any unauthorized member interfering.

Cryptography is a fair choice for organizations to secure the critical data on their mainframe systems.
Like this article..? Rate it here:  Votes | Average: 1 out of 5  Votes | Average: 2 out of 5  Votes | Average: 3 out of 5  Votes | Average: 4 out of 5  Votes | Average: 5 out of 5     0 votes, average: out of 5    
About Author
Articles Stats
  Published Date - September 20 2013
  Total Views - 4
  Total Votes - 0
  Average Rating - 0
  Comments - 0
  Mr. Williams J Peterson
Since 1982, Software Diversified Services (SDS) is providing first-quality software and technical support for IBM mainframes and VM, VSE, and mainframe. SDS’s mainframe ftp secures ftp transactions on the mainframe network. At you can find product trials and webcasts of other mainframe software tools from Software Diversified Services.
Particular Article
Author Article
  • How Open System Adapter Express (OSA-E) Secures Your Organization from Network Security Threats?
  • [2013-09-20 ]
    Secure data sharing over an enterprise network is a constant challenge for organizations as it involves dealing with many potential threats during data transfers. Read More...
  • Cryptography on Mainframe Systems
  • [2013-09-20 ]
    Mainframe system stores critical information of an organization; it communicates and coordinates with numerous devices that are connected to it in a network. Read More...
  • Encryption Basics
  • [2013-09-09 ]
    Encryption is a privacy scheme to convert plain text into a non-readable form, called cypher-text, which cannot be understood by the unauthorized users. Read More...
  • Computer Inventory on the Organization’s Network
  • [2013-09-09 ]
    Nowadays, the market is overfilled with programs of different price tiers and functionality. Often, the head managers get into difficulties trying to choose the best one among the dozens of tools. Read More...
  • Mainframe REXX
  • [2013-08-10 ]
    The Base Control Program (BCP) or MVS is the z/OS base element, which provides essential operating system services to the mainframe users. Read More...
  • Mainframe Software
  • [2013-08-10 ]
    The Enterprises working with mainframe systems should have a comprehensive list of the mainframe software available in the market to meet specific needs. Read More...
  • FTP to Mainframe
  • [2013-08-10 ]
    FTP or File Transfer Protocol, is a standard architecture to transfer files in a TCP-based network on various platforms including z/OS, Unix, AS/400 and Windows. Read More...
  • [2013-08-10 ]
    The core of z/OS, also referred as Multiple Virtual Storage (MVS) basically operates in two environments. Read More...
  • 10 Tips on Preparing to Replace a Policy Administration System
  • [2013-08-10 ]
    Many insurers launched new Policy Administration Systems (PAS) in the late 90’s, and the industry noise level is indicating that it may be time for many to upgrade. Read More...
  • How to Choose Best MSG2EML Converter Tool to Convert MSG to EML File?
  • [2013-07-14 ]
    There are many reasons when user prompts with the need to know how to choose best MSG2EML converter tool for export MSG to EML purpose. The search comes to an end at MSG to EML converter software. Read More...
  • MS Access Corrupt Database Recovery Tool – Ascertain Its Require Amongst Users
  • [2013-06-28 ]
    This segment gives readers a perfect view over various reasons behind the rising demand of MS Access corrupt database recovery tool amongst users and also suggest Access Recovery tool for the solution Read More...
  • Mainframe Security
  • [2013-06-28 ]
    For several decades mainframe is being vastly used in many public and private Organizations to hold business critical data. Read More...
  • MSG To PST Download: Know What Is Beneficial About The Conversion
  • [2013-06-28 ]
    The segment will help you get familiar with creation of MSG files, major reasons that make PST files beneficial over MSG’s, etc for which MSG to PST Converter available with MSG to PST download. Read More...
  • Opt For Reliable MSG2EML Converter for Complete Email Migration
  • [2013-06-28 ]
    The article overviews the situations that compel users to call for MSG2EML converter applications. Also, this section highlights the right way of converting emails from MSG file format to EML. Read More...
  • Securing Mainframe FTP
  • [2013-06-14 ]
    File Transfer Protocol (FTP), built on client-server architecture, is a standard method for transferring files between hosts over a TCP-based network on different platforms as Unix, Z/OS, AS/400. Read More...
      Submit Articles - Free Articles - Online Articles Submission  
      WebZine Articles ( is a registered trademark. All Rights Reserved. 2012