IBM 4764 PCI-X Cryptographic Coprocessor

Announcement

On May 24, 2011, IBM announced that the IBM 4764-001 Cryptographic Coprocessor and its associated feature code 1008 (battery-replacement kit) will be withdrawn from marketing effective December 31, 2011 (IBM United States Withdrawal Announcement 911-129).

On or after the effective date for the withdrawal of this offering, you can no longer order this product directly from IBM. However, IBM will continue to honor contracts until expiration or termination of the current contract. You may be able obtain the product on an as-available basis through IBM Business Partners.

Feature code 1008 will no longer be used to order battery replacement kits. Battery replacement kits and multi-battery packs are now available for ordering as part numbers.

Library

Product documentation is available in PDF format. To view a PDF document, you need the Adobe® (Adobe Systems Incorporated) Reader®. If you don't have the Reader installed, you can download a complimentary copy from Adobe (Link resides outside ibm.com).

IBM 4764 Common Cryptographic Architecture Support Program

The CCA Basic Services and Secure Key Solution manuals describe the capabilities of the cryptographic application programming interface (API) provided with the CCA Support Program. The CCA installation manuals describe obtaining coprocessor hardware and software, loading software into the coprocessor, using the provided utility programs to manage the cryptographic node, and building applications to use with the CCA API.

Deprecated content: The CEX2C / 4764 manual linked here is deprecated in favor of the manual here: Secure Key Solution with the Common Cryptographic Architecture: Application Programmer's Guide (3.18MB) which gives information for the CEX3C as well as the CEX2C. All new application development should proceed using the most recent CEX3C / 4765 host code release as well CCA software for System z servers running Linux, which includes CEX2C support.

IBM 4764 custom programming

Research papers

IBM Research also has additional papers and information pertaining to the IBM 4764 and security on their Security Research page.