Encryption between business partners that run z/OS environments uses a form of B2B tape sharing based on an exchange of digital certificates. This uses public key/private key cryptography to encrypt and decrypt randomly generated symmetric keys. The symmetric key is used to encrypt the actual tape data. The symmetric key itself is written to tape in encrypted form using the public key portion of the public key/private key pair of the B2B business partner. This encrypted symmetric key, along with other information, is stored on the tape in z/OS user header labels. The business partner receives the tape and uses the private key portion of the public key/private key pair to decrypt the symmetric key. With this decrypted symmetric key, the business partner the decrypts the actual tape data. CA Tape Encryption handles this process seamlessly and automatically.
Business partners running a z/OS environment should install a copy of CA Tape Encryption. These partners must have the no-cost base product or any of the purchased CA Tape Encryption options.
| Copyright © 2011 CA. All rights reserved. | Tell Technical Publications how we can improve this information |