advertise your website Login Registration
Submission Guidelines Recent Approved Articles Featured Articles
Submit Free Article
Home About Us Advertising GuideLines Do's & Don't T & C FAQ Contact us
  Home Computers & Technology Articles Software Articles
HostJinni Promotions
Articles Category
Arts & Entertainment
Computers & Technology
Food & Drink
Health & Fitness
Home & Family
Home Based Business
Home Improvement
Just for Women
Kids & Teens
News & Society
Online Business
Online Tickets
Real Estate
Reference and Education
Self Improvement
Sports & Recreation
Travel & Tourism
  Member Area
Author Login
Free Registration
Authors From Country
  Helpful Topics
How to Write Articles
Free Early Approval Tips
Why Article Submission
  Best of Webzine
Leader Board
Most Viewed Articles
Top Rated Articles
  WebZine Status
Total Articles -25429
Registered Authors - 4565
Featured Articles - 340
Articles added this
month - 0

Overview Of Latest Features For IBM Ported Tools

IBM Ported Tools for z/OS is a program product to deliver applications and tools for z/OS platform and it is supported on z/OS 1.10 and above. OpenSSH is a ported application provided by IBM Ported Tools for z/OS and it provides secure encryption for both remote login and file transfer.

The latest features for IBM Ported Tools for z/OS include MAC algorithms of OpenSSH and the new z/OS extensions ICSF ciphers. As an update now OpenSSH can be set up to use Integrated Cryptographic Service Facility (ICSF) to implement Message Authentication Code (MAC) algorithms and certain ciphers. This extension is provided by PTF for APAR OA37278. It enables OpenSSH to use hardware support.

Allowing ICSF in OpenSSH helps minimizing the CPU time consumed by SSH sessions on z/OS resulting in increased data transfer. This support applies to all the client and server commands – ssh, scp, sftp, sshd and sftp-server. ICSF enables the use of cryptographic function CPACF (CP Assist for Cryptographic Function) hardware support. This new feature addresses the following requirements

•Eliminate unnecessary SMF error messages

•Added internal serviceability improvements

•Modified buffer relocation to minimize heap fragmentation

The rapid data processing automation enables the businesses to transmit sensitive data on open communication networks and store confidential data offline, increasing the potential threat of the sensitive data being accessed by unauthorized persons. To make a distributed computing environment secure, a combination of elements must work together. According to International Organization for Standardization (ISO) standard 7498-2 the security functions are as follows

•Identification and authentication of the user

•Access control for resources

•Data confidentiality

•Data integrity

•Security management and


To provide data confidentiality and identity authentication and in turn protect the business commerce on Internet, cryptographic services are mandatory.

Cryptography represents a set of techniques for disguising data. The encrypted data is only available to the authorized persons who can readily restore the data to its original form. The growth of distributed systems and the vast use of Internet have resulted in increased data security needs and cryptography efficiently solves this purpose by maintaining data confidentiality and verifying data integrity. The common processes dealt by Cryptography are

•Enciphering or encrypting the plain text

•Deciphering or decrypting the cipher text

•Condensing a long message into a compact bit string called hashing and

•Generating and verifying digital signatures

ICSF supports IBM's Common Cryptographic Architecture (CCA), which is based on the ANSI Data Encryption Algorithm (DEA) and the Advanced Encryption Standard (AES). In these cryptographic systems secret keys are shared in between two parties to protect data and keys that are exchanged on the network and establish and secured communications channel. ICSF uses triple DES encryption for data privacy and AES for encrypting and decrypting using 128-bit, 192-bit and 256-bit secure and clear keys. For public key cryptography, ICSF supports both NIST Digital Signature Standard algorithm and Rivest-Shamir-Adelman algorithm, where each party establishes a pair of public key and private key. The public keys are published in a reliable information source and private keys are maintained in secure storage.

Apart from encryption and decryption of data, ICSF provides application programs for the following tasks

•Generate, verify and translate Personal Identification Number (PIN)

•Ensure data integrity by using Message Authentication Codes (MACs), digital signatures, hashing algorithms or VISA card / Master card Verification Code

•Provide enhanced key management for Crypto Assist instructions

•Provide remote key loading for Automated Teller Machines (ATMs)

•Develop Secure Electronic Transaction (SET) applications and acquire payment gateway

•PKA-encrypt and PKA-decrypt symmetric key data

•Develop EMV ICC applications using CSNBSKY, CSNBPCU, CSNBDKG and CSNBSPN callable services
Like this article..? Rate it here:  Votes | Average: 1 out of 5  Votes | Average: 2 out of 5  Votes | Average: 3 out of 5  Votes | Average: 4 out of 5  Votes | Average: 5 out of 5     2 votes, average: 1.5 out of 5    
About Author
Articles Stats
  Published Date - May 17 2013
  Total Views - 4491
  Total Votes - 2
  Average Rating - 1
  Comments - 0
  Mr. Nate Rodnay
Since 1982, Software Diversified Services is providing first-quality software and technical support for IBM mainframes and VM, VSE, ftp to mainframe and z/OS systems. SDS mainframe software provides security, encryption, compression for mainframe data, OSA express monitoring, secure file transfer (SFTP), SNA and IP network management and automation.
Particular Article
Author Article
  • How Open System Adapter Express (OSA-E) Secures Your Organization from Network Security Threats?
  • [2013-09-20 ]
    Secure data sharing over an enterprise network is a constant challenge for organizations as it involves dealing with many potential threats during data transfers. Read More...
  • Cryptography on Mainframe Systems
  • [2013-09-20 ]
    Mainframe system stores critical information of an organization; it communicates and coordinates with numerous devices that are connected to it in a network. Read More...
  • Encryption Basics
  • [2013-09-09 ]
    Encryption is a privacy scheme to convert plain text into a non-readable form, called cypher-text, which cannot be understood by the unauthorized users. Read More...
  • Computer Inventory on the Organization’s Network
  • [2013-09-09 ]
    Nowadays, the market is overfilled with programs of different price tiers and functionality. Often, the head managers get into difficulties trying to choose the best one among the dozens of tools. Read More...
  • Mainframe REXX
  • [2013-08-10 ]
    The Base Control Program (BCP) or MVS is the z/OS base element, which provides essential operating system services to the mainframe users. Read More...
  • Mainframe Software
  • [2013-08-10 ]
    The Enterprises working with mainframe systems should have a comprehensive list of the mainframe software available in the market to meet specific needs. Read More...
  • FTP to Mainframe
  • [2013-08-10 ]
    FTP or File Transfer Protocol, is a standard architecture to transfer files in a TCP-based network on various platforms including z/OS, Unix, AS/400 and Windows. Read More...
  • [2013-08-10 ]
    The core of z/OS, also referred as Multiple Virtual Storage (MVS) basically operates in two environments. Read More...
  • 10 Tips on Preparing to Replace a Policy Administration System
  • [2013-08-10 ]
    Many insurers launched new Policy Administration Systems (PAS) in the late 90’s, and the industry noise level is indicating that it may be time for many to upgrade. Read More...
  • How to Choose Best MSG2EML Converter Tool to Convert MSG to EML File?
  • [2013-07-14 ]
    There are many reasons when user prompts with the need to know how to choose best MSG2EML converter tool for export MSG to EML purpose. The search comes to an end at MSG to EML converter software. Read More...
  • MS Access Corrupt Database Recovery Tool – Ascertain Its Require Amongst Users
  • [2013-06-28 ]
    This segment gives readers a perfect view over various reasons behind the rising demand of MS Access corrupt database recovery tool amongst users and also suggest Access Recovery tool for the solution Read More...
  • Mainframe Security
  • [2013-06-28 ]
    For several decades mainframe is being vastly used in many public and private Organizations to hold business critical data. Read More...
  • MSG To PST Download: Know What Is Beneficial About The Conversion
  • [2013-06-28 ]
    The segment will help you get familiar with creation of MSG files, major reasons that make PST files beneficial over MSG’s, etc for which MSG to PST Converter available with MSG to PST download. Read More...
  • Opt For Reliable MSG2EML Converter for Complete Email Migration
  • [2013-06-28 ]
    The article overviews the situations that compel users to call for MSG2EML converter applications. Also, this section highlights the right way of converting emails from MSG file format to EML. Read More...
  • Securing Mainframe FTP
  • [2013-06-14 ]
    File Transfer Protocol (FTP), built on client-server architecture, is a standard method for transferring files between hosts over a TCP-based network on different platforms as Unix, Z/OS, AS/400. Read More...
      Submit Articles - Free Articles - Online Articles Submission  
      WebZine Articles ( is a registered trademark. All Rights Reserved. 2012