Abstract: Dataset Encryption is one of the major pillars of Pervasive Encryption.
When you start implementing dataset encryption, you will start asking yourself:
• How can I exchange my encrypted data with my other LPARs or remote site?
• How can I exchange my encrypted data with my business partners?
• Should I send my data along with its encryption key?
• How can I exchange my secured keys?
The purpose of this document is to describe the procedures that can be used to transport secured AES encrypted data keys form one host system to another.
We will cover different scenarios that we have implemented, and for each we will describe the procedures that we have used to perform the key transportation.