Dell PowerVault TL4000 Dell PowerVault ML6000 Encryption Key Manager User's - Page 19

In Summary, Encryption Management, Method, Keys used by, IBM Encryption

Page 19 highlights

In Summary The number of encryption keys that may be used for each volume depends on the tape drive, the encryption standard, and method used to manage the encryption. | For transparent encryption of LTO 4 and LTO 5, (that is, using library-managed encryption with the Encryption Key Manager,) the uniqueness of DKs depends on the availability of a sufficient number of pre-generated keys to the Encryption Key Manager. Table 1-1. Encryption Key Summary Encryption Management Keys used by | Method IBM Encryption T10 Encryption Library-Managed Encryption 1 DK / cartridge N/A Application-Managed Encryption Multiple DKs / cartridge Multiple DKs / cartridge DK = Symmetric AES 256-bit DK Chapter 1. Tape Encryption Overview 1-7

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122

In Summary
The number of encryption keys that may be used for each volume depends on the
tape drive, the encryption standard, and method used to manage the encryption.
For transparent encryption of LTO 4 and LTO 5, (that is, using library-managed
encryption with the Encryption Key Manager,) the uniqueness of DKs depends on
the availability of a sufficient number of pre-generated keys to the Encryption Key
Manager.
Table 1-1. Encryption Key Summary
Encryption Management
Method
Keys used by
IBM Encryption
T10 Encryption
Library-Managed Encryption
1 DK / cartridge
N/A
Application-Managed
Encryption
Multiple DKs / cartridge
Multiple DKs / cartridge
DK
= Symmetric AES 256-bit DK
Chapter 1. Tape Encryption Overview
1-7
|
|