Your browser does not allow storing cookies. We recommend enabling them.


Hardware Acceleration of Cryptographic Operations

Tectia Server for IBM z/OS supports hardware acceleration on cryptographic operations with the following algorithms:

  • 3DES


  • SHA-1

  • SHA-2

  • RNG (random number generation)

In addition, Tectia client tools for z/OS support AES-CTR bulk encryption outgoing to servers accepting that cipher, via an implementation exploiting CPACF (Central Processor Assist for Cryptographic Functions) AES-CBC.




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now