473,378 Members | 1,393 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,378 software developers and data experts.

About Encryption Function in Db2

Hi All

I can able to encrypt data on my development server using DB2
encryption function. My Development server configuration is Intel 3.2
GHz processor.

But when I go through document on Db2 build in encryption function its
mentioned that it requires

1. Integrated Cryptographic Service Facility (ICSF)
2. On z990, CPACF is required (PCIXCC card is not, unless DRDA
encryption is necessary)
3. Pre-z990, cryptographic coprocessor is required.

What is this ICSF? and If I deploy my DB2 database on any server will
build in DB2 encryption function will work?

Thanks and regards
Suresh

Mar 23 '06 #1
1 2009
Ian
Suresh wrote:
Hi All

I can able to encrypt data on my development server using DB2
encryption function. My Development server configuration is Intel 3.2
GHz processor.

But when I go through document on Db2 build in encryption function its
mentioned that it requires

1. Integrated Cryptographic Service Facility (ICSF)
2. On z990, CPACF is required (PCIXCC card is not, unless DRDA
encryption is necessary)
3. Pre-z990, cryptographic coprocessor is required.

What is this ICSF? and If I deploy my DB2 database on any server will
build in DB2 encryption function will work?

Are you reading the wrong documentation? Or are you developing for
DB2 for Linux/UNIX/Windows and deploying on DB2 z/OS? Those
requirements are for DB2 on z/OS.
Encryption on DB2 for LUW works fine on any LUW environment.
Mar 23 '06 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

2
by: David | last post by:
Hope someone can help or have a free control. I am going to be passing data from a client computer to a server via a winsock control. I want to encrypt/decript the contents of the string that is...
34
by: Blake T. Garretson | last post by:
I want to save some sensitive data (passwords, PIN numbers, etc.) to disk in a secure manner in one of my programs. What is the easiest/best way to accomplish strong file encryption in Python? ...
6
by: Sahil Malik [MVP] | last post by:
Public Private Key Pairs - How do they work? ----------------------------------------------- I was looking at a presentation recently in which it was suggested that - User 1 Encrypts a message...
0
by: Peter M | last post by:
I found this encryption class in the newsgroups and wanted to update this code so that the encryption is 512, not 256.... What has to be done to do this? Imports System Imports...
2
by: almurph | last post by:
Hi everyone, Can you help me please? I am having a problem with the encryption/decryption of words with the Irish fada in them. The Irish fada is like this: áéíóú/ÁÉÍÓÚ. It's kind of like the...
5
by: Suresh | last post by:
Hi All I am designing DB2 database. I have some entities each has nearly 40-60 attributes. Each of these entity (table) have password, some other information as high security attribute. So...
3
by: =?Utf-8?B?TG9yZW4=?= | last post by:
I’m trying to encrypt and decrypt a file in vb.net. I am using the TripleDESCryptoServiceProvider encryption found in System.Security.Cryptography. Below is the code for my Encrypt and Decrypt...
9
by: Betikci Boris | last post by:
I get bored last night and wrote a script that uses xor for encrypt- decrypt, however it woks fine under linux 2.6.25, text and documents are ok, but fails on compressed files *.jpg, *.pdf , etc ....
0
by: Jon.Hakkinen | last post by:
Hi all, I'm on DB2 9.5 fp 0 on Windows. I have a simple SQL stored procedure which uses the Encrypt() function to insert data in a table. I do not set the encryption password inside the...
1
by: CloudSolutions | last post by:
Introduction: For many beginners and individual users, requiring a credit card and email registration may pose a barrier when starting to use cloud servers. However, some cloud server providers now...
0
by: ryjfgjl | last post by:
In our work, we often need to import Excel data into databases (such as MySQL, SQL Server, Oracle) for data analysis and processing. Usually, we use database tools like Navicat or the Excel import...
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.