Top Banner
© September 2015 Crypto Performance: Expectations, Operations & Reporting Greg Boyd [email protected] www.mainframecrypto.com
45

Crypto Performance: Expectations, Operations & Reporting

Mar 27, 2022

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Crypto Performance: Expectations, Operations & Reporting

©

September 2015

Crypto Performance: Expectations, Operations &

ReportingGreg Boyd

[email protected]

Page 2: Crypto Performance: Expectations, Operations & Reporting

©

Copyrights and Trademarks

• Presentation based on material copyrighted by IBM, and developed by myself, as well as many others that I worked with over the past 10 years

• Copyright © 2014 Greg Boyd, Mainframe Crypto, LLC. All rights reserved. • All trademarks, trade names, service marks and logos referenced herein belong to their

respective companies. IBM, System z, zEnterprise and z/OS are trademarks of International Business Machines Corporation in the United States, other countries, or both. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies.

• THIS PRESENTATION IS FOR YOUR INFORMATIONAL PURPOSES ONLY. Greg Boyd and Mainframe Crypto, LLC assumes no responsibility for the accuracy or completeness of the information. TO THE EXTENT PERMITTED BY APPLICABLE LAW, THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING, WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. In no event will Greg Boyd or Mainframe Crypto, LLC be liable for any loss or damage, direct or indirect, in connection with this presentation, including, without limitation, lost profits, lost investment, business interruption, goodwill, or lost data, even if expressly advised in advance of the possibility of such damages.

September 2015 zExchange – Crypto Performance Page 2

Page 3: Crypto Performance: Expectations, Operations & Reporting

©

Agenda

• Crypto Levelset• Crypto Functionality• Clear Key vs Secure Key vs Protected Key• Crypto Hardware Technology

• Hardware performance metrics• Operational factors• Crypto performance data and reports

Page 3September 2015 zExchange – Crypto Performance

Page 4: Crypto Performance: Expectations, Operations & Reporting

©

Crypto Functions

• Data Confidentiality• Symmetric – DES/TDES, AES• Asymmetric – RSA, Diffie-Hellman, ECC

• Data Integrity• Modification Detection• Message Authentication• Non-repudiation

• Financial Functions• Key Security & Integrity

September 2015 zExchange – Crypto Performance Page 4

Page 5: Crypto Performance: Expectations, Operations & Reporting

©

Clear Key / Secure Key / Protected Key• Clear Key – key may be in the clear, at least briefly,

somewhere in the environment• Secure Key – key value does not exist in the clear

outside of the HSM (secure, tamper-resistant boundary of the card)

• Protected Key – key value does not exist outside of physical hardware, although the hardware may not be tamper-resistant

Page 5September 2015 zExchange – Crypto Performance

Page 6: Crypto Performance: Expectations, Operations & Reporting

©

System z Clear Key Crypto Hardware –z13, zEC12/zBC12, z196/z114, z10 EC & BC, z9 EC & BC, z990/z890• CP Assist for Crypto Function

(CPACF)• DES/TDES (56-, 112-, 168-bit)• AES-128, AES-192, AES-256• SHA-1, SHA-2 (SHA-224, SHA-256,

SHA-384, SHA-512)

Page 6

TechDoc WP100810 – A Synopsis of System z Crypto Hardware

September 2015 zExchange – Crypto Performance

Page 7: Crypto Performance: Expectations, Operations & Reporting

©

System z Secure Key Crypto Hardware – CEX5S, CEX4S, CEX3/CEX3-1P• Secure Key DES/TDES• Secure Key AES• Financial (PIN) Functions• Random Number Generate and

Generate Long• Key Generate/Key Management• SSL Handshakes, ECDSA support• Protected Key Support• PKCS #11 (CEX4S only)

Page 7

TechDoc WP100810 – A Synopsis of System z Crypto Hardware

September 2015 zExchange – Crypto Performance

Page 8: Crypto Performance: Expectations, Operations & Reporting

©

Crypto Card Modes

• Coprocessor• Secure key support• Financial PIN operations• Key generation• RSA public & private key operations

• Accelerator• RSA public key operations only

• EP11 (Enterprise PKCS #11)• PKCS #11 clear and secure key operations

September 2015 zExchange – Crypto Performance Page 8

Page 9: Crypto Performance: Expectations, Operations & Reporting

©

Software vs Hardware Encryption

• Adapted from Ernie Nachtigall’s TechDoc, WP101240 ‘IBM z10 DES Cryptographic Performance’ available at http://www.ibm.com/ support/techdocs/ atsmastr.nsf/WebIndex/ WP101240

Page 9September 2015 zExchange – Crypto Performance

447623

597043927

241491927

221335 2196450

100000000

200000000

300000000

400000000

500000000

600000000

700000000

BDKDES(Software)

DES (CPACF) TDES (CPACF) DES (PCI) TDES (PCI)

Bytes Encrypted per SecondSoftware vs Hardware

0

10

20

30

40

50

60

BDKDES(Software)

DES (CPACF) TDES (CPACF) DES (PCI) TDES (PCI)

CPU Consumption

Page 10: Crypto Performance: Expectations, Operations & Reporting

©

z13Symmetric Key Performance

• Adapted from the IBM z13 Cryptographic Performance March 2015 document at

http://www.ibm.com/common/ssi/cgi-bin/ssialias?subtype=WH&infotype=SA&htmlfid=ZSW03283USEN&attachment=ZSW03283USEN.PDF

Page 10September 2015 zExchange – Crypto Performance

47.5182.3

624.3 1585.0 2929.0 3089.0

21.784.9

317.2981.0 2714.0 3070.0

0.5152.044

8.07930.207 60.197 64.031

0.1

1.0

10.0

100.0

1000.0

10000.0

64 256 1024 4096 64K 1M

Byt

es p

er s

econ

d

Input Blocksize

z13 AES-128 Bit Performance - Bytes per second (x10**6)Clear Key vs Protected Key vs Secure Key

Clear Key Protected Key Secure Key

51.6171.4

416.6 644.5 772.6 782.8

0.4951.967

7.74228.026 51.894

5.47121.4

78.9243.4

506.0 755.1 779.8

0.1

1.0

10.0

100.0

1000.0

64 256 1024 4096 64K 1M

Byt

es p

er s

econ

d

Input Blocksize

z13 TDES Performance - Bytes per second (x10**6)Clear Key vs Protected Key vs Secure Key

Clear key Secure Key Protected Key

Page 11: Crypto Performance: Expectations, Operations & Reporting

©

zEC12 Symmetric Key Performance

• Adapted from the IBM zEnterpriseEC12 Performance of Cryptographic Operations document at

http://www.ibm.com/systems/z/ advantages/security/zec12cryptography.html

Page 11

zEC12 AES-128 Bit Performance - Bytes per second (x10**6)Clear Key vs Protected Key vs Secure Key

50.0 183.1 543.0 1081.0 1522.0 1560.0

24.6 94.1 318.9 800.2 1423.0 1495.0

0.148 0.058

2.055 6.142 9.822 10.191

0.00.11.0

10.0100.0

1000.010000.0

64 256 1024 4096 64K 1M

Input BlocksizeB

ytes

per

sec

ond

Clear Key Protected Key Secure Key

September 2015 zExchange – Crypto Performance

47.7138.9 267.0 348.8 383.6 385.8

0.1610.633

2.3727.692 13.372 14.00023.4

79.1196.1 310.4 376.8 382.1

0.1

1.0

10.0

100.0

1000.0

64 256 1024 4096 64K 1M

Byt

es p

er s

econ

d

Input Blocksize

zEC12 TDES Performance - Bytes per second (x10**6)Clear Key vs Protected Key vs Secure Key

Clear key Secure Key Protected Key

Page 12: Crypto Performance: Expectations, Operations & Reporting

©

Page 12

z196 Crypto Performance AES Encryption – Clear Key, Secure Key, Protected Key

z196 AES Performance: Clear Key vs Protected Key vs Secure Key

32.6122.8

395.3888.3 1406.0 1443.0

15.861.6

219.5612.9

1310.0 1399.0

0.160.60

2.196.34 10.05 10.41

0.1

1.0

10.0

100.0

1000.0

10000.0

64 256 1024 4096 64K 1M

Data Length (Bytes)

x10**6 Bytes

per sec

ond

Clear Key Protected Key Secure Key

TDES Encryption – Clear Key, Secure Key, Protected Keyz196 TDES Performance:

Clear Key vs Protected Key vs Secure Key

30.9

98.7218.4 313.3 359.9 362.3

15.5

55.0151.6

270.3 353.0 359.1

0.16

0.64

2.39

7.7513.44 14.05

0.1

1.0

10.0

100.0

1000.0

64 256 1024 4096 64K 1M

Data Length (Bytes)

x10**6 B

ytes

per sec

ond

Clear Key Protected Key Secure Key

Page 13: Crypto Performance: Expectations, Operations & Reporting

©

System SSL Performance – z13

Page 13

IBM z13 Model 2964-N96 (4 CPs)

z/OS Version 2 Release 1 (z/OS V2.1) and ICSF FMID HCR77B0

September 2015 zExchange – Crypto Performance

Caching SID/Client Authenti-

cationHand-shakes ETR

CPU Util%

Crypto Util %

100%/No Avoided 28766 62.35% NA

No/No Software 1430 99.99% NA

No/No 4 CEX5C 20561 75.50% 98.50%

No/No 1 CEX5A 21275 78.85% 94.50%

No/Yes 2 CEX5A 8232 42.94% 62.80%

28766

1430

20561 21275

8232

Handshakes

Han

dsha

kes

per s

econ

d

Hardware/Software Config

z13 System SSL HandshakesTransaction Throughput

Avoided

Software

62.35%

99.99%

75.50% 78.85%

42.94%

0 0

98.50% 94.50%

62.80%

0.00%

20.00%

40.00%

60.00%

80.00%

100.00%

Avoided Software 4 CEX5C 1 CEX5A 2 CEX5A

Hardware Utilization for SSL Handshakes

CPU Util% Crypto Util %

Page 14: Crypto Performance: Expectations, Operations & Reporting

©

System SSL Performance – zEC12

Page 14

zEC12 System SSL HandshakesTransaction Throughput

24808

1378

9003

17493

11477

Avoided Software 4 CEX4SC 4 CEX4SA 4 CEX4SA

Hardware/Software Config

Han

dsha

kes

per

seco

nd

ETR

zEC12 System SSLCPU Util

98.44% 100.00%

56.29%

98.34% 98.61%99.40%

87.80%

79.10%

50.0%55.0%60.0%65.0%70.0%75.0%80.0%85.0%90.0%95.0%

100.0%

Avoided Software 4 CEX4SC 4 CEX4SA 4 CEX4SA

Hardware/Software Config

CPU

Per

cent

age

75.0%

80.0%

85.0%

90.0%

95.0%

100.0%

CPU UtilizationCrypto Util

zEC12 HA1 – 4 CPs

September 2015 zExchange – Crypto Performance

Page 15: Crypto Performance: Expectations, Operations & Reporting

©

Crypto performance across CECs –Native Clear Key

Page 15September 2015 zExchange – Crypto Performance

120.4151.1

181.5 178.9 171.3222.3 215.2 216.2

290.6

411.8

179.6217.8

369335.6

445.6 421.3 409.5

644.3 626.9

318.6292.6

407.5366.1 373.8

568.5594.6

0

100

200

300

400

500

600

700

Byt

es p

er s

econ

d x

10**

6

Clear Key Encryption 64 Byte Input Block

TDES CPACF

AES-128 CPACF

AES-256 CPACF

Page 16: Crypto Performance: Expectations, Operations & Reporting

©

Crypto performance across CECs –using the APIs

September 2015 zExchange – Crypto Performance Page 16

132.54161.69198.76243.16 245.9 244.9 304.9 307.6 362.3 385.8

782.8

0 39.58265.4 325.58

811.5 805.3997.8 1012

14431560

3089

0 0 0 0

658.8 652.3810.3 819

1125 1211

2360

0

500

1000

1500

2000

2500

3000

3500

Byt

es p

er s

econ

d x

10**

6

Clear Key Encryption via the APIs1M Input Blocks

TDES Clear Key

AES-128 Clear Key

AES-256 Clear Key

Page 17: Crypto Performance: Expectations, Operations & Reporting

©

Crypto performance across CECs –Secure Key

Page 17September 2015 zExchange – Crypto Performance

2.7252 2.6634 3.7597 3.76966.246 4.7941

9.555 9.59214.054 14

54.711

0 0 0 0 0 0

9.549 9.464 10.413 10.991

64.031

0 0 0 0 0 0

9.541 9.419 10.209 9.995

61.099

0

10

20

30

40

50

60

70

Byt

es p

er s

econ

d x

10**

6

Secure Key Encryption1M Input Blocks

TDES Secure Key

AES-128 Secure Key

AES-256

Page 18: Crypto Performance: Expectations, Operations & Reporting

©

Crypto Performance across KEKs –selected APIs

Page 18September 2015 zExchange – Crypto Performance

0

2000

4000

6000

8000

10000

12000

Ope

ratio

ns p

er s

econ

dCrypto Performance Selected Operations/second

Key Generate

Clear PIN Generate

Encrypted PINVerification

Page 19: Crypto Performance: Expectations, Operations & Reporting

©

Config for Performance

• ICSF Options• KEYAUTH(YES/NO)* – check key integrity in memory• CKTAUTH(YES/NO)* – check key integrity on DASD• CHECKAUTH(YES/NO) – skip SAF checks for Supervisor State or System

Key callers• SYSPLEXCKDS / SYSPLEXPKDS / SYSPLEXTKDS – enqueues and

contention between systems• Security Policies

• Disable OWH and RNG SAF checks**• CSF.CSFSERV.AUTH.CSFOWH.DISABLE• CSF.CSFSERV.AUTH.CSFRNG.DISABLE

*KEYAUTH & CKTAUTH have been deprecated in HCR77A1**OWH & RNG SAF Check Security Policies available in HCR77A1

Page 19September 2015 zExchange – Crypto Performance

Page 20: Crypto Performance: Expectations, Operations & Reporting

©

Crypto Microcode Installed?

Page 20

• From the HMC, in Single Object Mode, look at the CPC Details

September 2015 zExchange – Crypto Performance

Page 21: Crypto Performance: Expectations, Operations & Reporting

©

PCI Cards Installed?

Page 21

From HMC, CPC Operational Customization, View LPAR Cryptographic Controls

September 2015 zExchange – Crypto Performance

Page 22: Crypto Performance: Expectations, Operations & Reporting

©

PCI Card LPAR Assignment

Page 22September 2015 zExchange – Crypto Performance

Page 23: Crypto Performance: Expectations, Operations & Reporting

©

Are your Master Keys loaded and correct?

Page 23

Serial

CoProcessor Number Status AES DES ECC RSA P11

----------- --------- ------ --- --- ---- --- ---

__ G01 00000001 ONLINE U U C U

__ G02 00000002 ACTIVE A U A E

__ G03 00000003 ACTIVE A U A C

__ H07 ACTIVE

__ SC06 00000006 ACTIVE A U A C

__ SP07 00000008 ACTIVE A

September 2015 zExchange – Crypto Performance

Page 24: Crypto Performance: Expectations, Operations & Reporting

©

How do I tell, what ciphersuites –F GSKSRVR,DISPLAY CRYPTOGSK01009I Cryptographic status Algorithm Hardware SoftwareDES 56 56 3DES 168 168 AES 256 256 RC2 -- 128 RC4 -- 128 RSA Encrypt -- 4096 RSA Sign -- 4096 DSS -- 1024 SHA-1 160 160 SHA-2 512 512 ECC -- --

Environment: z196 running z/OS 1.13, but ICSF not active

September 2015 zExchange – Crypto Performance Page 24

Page 25: Crypto Performance: Expectations, Operations & Reporting

©

How do I tell, what ciphersuites –F GSKSRVR,DISPLAY CRYPTOGSK01009I Cryptographic status Algorithm Hardware SoftwareDES 56 56 3DES 168 168 AES 256 256 RC2 -- 128 RC4 -- 128 RSA Encrypt 4096 4096 RSA Sign 4096 4096 DSS -- 1024 SHA-1 160 160 SHA-2 512 512 ECC 521 521

Environment: z196 running z/OS 1.13, with ICSF active

September 2015 zExchange – Crypto Performance Page 25

Page 26: Crypto Performance: Expectations, Operations & Reporting

©

CPU Measurement Facility

Counter # Description

64 Pseudo RNG Function Count

65 Pseudo RNG Cycle Count

66 Pseudo RNG Blocked Function Count

67 Pseudo RNG Blocked Cycle Count

68 SHA Function Count

69 SHA Cycle Count

70 SHA Blocked Function Count

71 SHA Blocked Cycle Count

Counter # Description

72 DEA Function Count

73 DEA Cycle Count

74 DEA Blocked Function Count

75 DEA Blocked Cycle Count

76 AES Function Count

77 AES Cycle Count

78 AES Blocked Function Count

79 AES Blocked Cycle Count

• Provides hardware instrumentation data for production systems• Supplements current performance data from SMF, RMF, DB2, CICS, etc.• Measure (count) CPACF Usage• CPU MF Counters useful for performance analysis• Data gathering controlled through z/OS HIS (HW Instrumentation

Services)• Recorded in SMF Type 113

September 2015 zExchange – Crypto Performance Page 26

Page 27: Crypto Performance: Expectations, Operations & Reporting

©

Sample Report – Crypto COUNTERS provide measurement of CPACF Crypto Co-Processor Usage

Page 27

This information may be useful in determining:

• A count of How Many CPACF encryption functions were executed

• How much CPU Time (cycles) were usedThe encryption facility executed both SHA functions and TDES functions for this specific test.

Ran DASD dumps sequentially over 20 minute duration With option: ENCRYPT(CLRTDES) - These numbers come from a synthetic Benchmark and do not represent a production workload

•It is important to remember that other Crypto functions may be executing in software and/or on Crypto Express Cards (if installed & implemented). This is not measured by the CPU MF Crypto COUNTERS

•CPU MF Crypto COUNTERS can help assess how many of the Crypto Functions are occurring on the CPACF Co-Processors

September 2015 zExchange – Crypto Performance

Slide adapted from several Share presentations by John Burg

Page 28: Crypto Performance: Expectations, Operations & Reporting

©

SMF Type 82 – ICSF Record

• Subtype 1 – ICSF Initialization• Subtype 3 – change in number of available processors• Subtype 4 – when ICSF handles error conditions for crypto

feature failure or tampering• Subtype 5 – change in SSM• Subtype 6 & 7 – when a key part is entered via Key Entry

Unit (KEU)• Subtype 7 – Key Part Entry Section• Subtype 8 – Cryptographic Key Data Set Refresh Section• Subtype 9 – Dynamic CKDS Update• Subtype 10 – when clear key part entered for PKA-MK

Page 28September 2015 zExchange – Crypto Performance

Page 29: Crypto Performance: Expectations, Operations & Reporting

©

SMF Type 82 – ICSF Record (cont.)

• Subtype 11 – when clear key part entered for DES-MK• Subtype 12 – for each request and reply from calls to

CSFSPKSC service by TKE• Subtype 13 – Dynamic PKDS Update• Subtype 14 – Cryptographic Coprocessor Master Key Entry• Subtype 15 – PCI Cryptographic Coprocessor Retained Key

Create/Delete• Subtype 16 – PCI Cryptographic Coprocessor TKE• Subtype 17 – periodically to provide some indication of PCI

Cryptographic Coprocessor usage• Subtype 18 – Cryptographic Processor Configuration• Subtype 19 – PCI X Cryptographic Coprocessor Timing

Page 29September 2015 zExchange – Crypto Performance

Page 30: Crypto Performance: Expectations, Operations & Reporting

©

SMF Type 82 – ICSF Record (cont.)

• Subtype 20 – Cryptographic Processor Processing Times• Subtype 21 – ICSF Sysplex Group Change Section• Subtype 22 – Trusted Block Create Callable Services Section• Subtype 23 – Token Data Set Update• Subtype 24 – Duplicate Tokens Found• Subtype 25 – Key Store Policy• Subtype 26 – Public Key Data Set Refresh• Subtype 27 – PKA Key Management Extensions• Subtype 28 –High Performance Encrypted Key (Protected

Key)• Subtype 29 – TKE Workstation Audit Record

Page 30September 2015 zExchange – Crypto Performance

Page 31: Crypto Performance: Expectations, Operations & Reporting

©

REXX EXEC CSFSMFR/Batch Job CSFSMFJ• Formats the SMF Type 82 records into a readable report

• Run CSFSMFJ to• Capture the Type 82 records (with IFASMFDP)• Sort the records by date/time• Execute CSFMFR, via Batch TSO

• Each Type 82 generates multiple lines of output• Formats the Type 82 for easier reading, but still lots of hex

data to interpretSubtype=0014 Cryptographic Coprocessor Timing Written periodically to provide some indication of coprocessor and accelerator Nov 2011 0:00:19.26

TME... 00000786 DTE... 0111305F SID... SYSC SSI... 00000000 STY... 0014 TFL... 10000000

TFL 10 Coprocessor is a CEX3C TNQ... C89B5841F5841AB1 TDQ... C89B5841F59D39B1 TWT... C89B5841F59D5AB1 TQU... 00000000 TSF... áä TIX... 00 TSN... 91008705 TDM... 02 TRN... 40

• Forensics report, not a performance report• See the ICSF Systems Programmer’s Guide

Page 31September 2015 zExchange – Crypto Performance

Page 32: Crypto Performance: Expectations, Operations & Reporting

©

SMF Type 70, Subtype 2 - RMF Processor Activity

• Cryptographic Coprocessor Data Section• Processor Index, Processor Type• Scaling Factor• Execution Time of all operations• Number of all operations on the coprocessor• Number of all RSA-key-generation operations

• Cryptographic Accelerator Data Section• Processor Index, Processor Type• Validity bit mask, Number of engines on the accelerator• Scaling factor• Execution time & number of operations by

• 1024-bit-ME 2048-bit-ME• 1024-bit-CRT 2048-bit-CRT• 4096-bit-ME 4096-bit CRT

Page 32September 2015 zExchange – Crypto Performance

Page 33: Crypto Performance: Expectations, Operations & Reporting

©

SMF Type 70, Subtype 2 - RMF Processor Activity

• Cryptographic PKCS11 Coprocessor Data Section• Processor Index, Processor Type• Scaling Factor• Aggregate Execution Time, Number of Operations

• Slow asymmetric-key functions• Fast asymmetric-key functions• Asymmetric-key generation• Symmetric-key functions complete• Symmetric-key functions partial

Page 33September 2015 zExchange – Crypto Performance

Page 34: Crypto Performance: Expectations, Operations & Reporting

©

SMF Type 70, Subtype 2 - RMF Processor Activity (cont.)

• ICSF Services Data Section• Single DES (Encipher & Decipher): Number of calls, bytes, and

instructions• Triple DES (Encipher & Decipher): Number of calls, bytes, and

instructions• MAC Generate/Verify: Number of calls to generate/verify, number

of bytes for which MAC was generated/verified, number of PCMF instructions used to generate/verify the MAC

• SHA-1: Number of calls to hash, number of bytes that were hashed, number of PCMF instructions used to hash the data

• PIN: number of translate calls, number of verify calls• SHA-224, SHA-256, SHA-384, SHA-512 : Number of calls to hash,

number of bytes that was hashed, number of PCMF instructions used to hash the data

• ICSF Data Level• AES Encipher & Decipher: number of calls sent to cop, number of

bytes processed, number of operationsPage 34September 2015 zExchange – Crypto Performance

Page 35: Crypto Performance: Expectations, Operations & Reporting

©

RMF Crypto Hardware Activity Report (From z/OS RMF Report Analysis 2.1, SC34-2665-00)

C R Y P T O H A R D W A R E A C T I V I T YPAGE 1

z/OS V2R1 SYSTEM ID TRX2 START 09/28/2013-08.15.00 INTERVAL 007.14.59RPT VERSION V2R1 RMF END 09/28/2013-15.30.00 CYCLE 1.000 SECONDS

-------- CRYPTOGRAPHIC CCA COPROCESSOR -------------- TOTAL ----------- KEY-GEN

TYPE ID RATE EXEC TIME UTIL% RATECEX2C 0 0.00 0.000 0.0 0.00

1 2.16 295.9 63.9 2.142 0.00 0.000 0.0 0.00

CEX3C 4 2.15 227.8 48.9 2.15CEX4C 7 0.29 1.926 0.1 0.00

--------------- CRYPTOGRAPHIC PKCS11 COPROCESSOR ----------------------------------------------------------- TOTAL ----------- --------------- OPERATIONS DETAILS ----------------

TYPE ID RATE EXEC TIME UTIL% FUNCTION RATE EXEC TIME UTIL%CEX4P 8 373.4 0.295 11.0 ASYM FAST 177.2 0.175 3.1

ASYM GEN 0.00 0.000 0.0ASYM SLOW 160.9 0.405 6.5SYMM COMPLETE 0.00 0.000 0.0SYMM PARTIAL 35.36 0.398 1.4

September 2015 zExchange – Crypto Performance Page 35

Page 36: Crypto Performance: Expectations, Operations & Reporting

©

-------- CRYPTOGRAPHIC ACCELERATOR ------------------------------------------------------------------------------------------------------ TOTAL ------------ - ME-FORMAT RSA OPERATIONS - - CRT-FORMAT RSA OPERATIONS -

TYPE ID RATE EXEC TIME UTIL% KEY RATE EXEC TIME UTIL% RATE EXEC TIME UTIL%CEX2A 3 766.9 0.434 33.3 1024 362.4 0.521 18.9 369.5 0.183 6.8

2048 0.00 0.000 0.0 34.99 2.175 7.6CEX3A 5 998.9 0.365 36.5 1024 246.4 0.534 13.2 554.3 0.205 11.3

2048 0.00 0.000 0.0 83.16 0.689 5.74096 0.00 0.000 0.0 115.1 0.547 6.3

CEX4A 6 918.4 0.301 27.6 1024 394.6 0.409 16.1 435.4 0.179 7.82048 0.00 0.000 0.0 88.33 0.415 3.74096 0.00 0.000 0.0 0.00 0.000 0.0

-------- ICSF SERVICES ----------------------------------------------------------------------------------------------------------------------- ENCRYPTION ---- --- DECRYPTION --- ------- MAC -------- ----------- HASH ------------- -------- PIN ----------SDES TDES AES SDES TDES AES GENERATE VERIFY SHA-1 SHA-256 SHA-512 TRANSLATE VERIFY

RATE 15.41 10.27 0.02 5.14 10.27 0.02 34.23 35.87 15352 <0.01 <0.01 8.97 5.14SIZE 3200 4400 189.0 800.0 4400 189.5 4573 4400 105.0 48.00 48.00

September 2015 zExchange – Crypto Performance Page 36

RMF Crypto Hardware Activity Report

Page 37: Crypto Performance: Expectations, Operations & Reporting

©

HMC Dashboard Monitor• The HMC/SE Monitors on the zEC12 now include a display

for the crypto adapters.• The Adapter Usage percentage is the same utilization that

shows up in the RMF Crypto Hardware Activity Report.• The Utilization on the card is calculated using the formula:

U = (Ta2 - Ta1) * S / (T2 -T1)Ta: time used for execution S: scaling factor T: Time of measurement interval

September 2015 zExchange – Crypto Performance Page 37

Page 38: Crypto Performance: Expectations, Operations & Reporting

©

Workload Activity (SMF Type 72, Subtype 3)

• Crypto Using and Delay Samples• CAM crypto using samples: a TCB was found

executing on a cryptographic asynchronous message processor

• CAM crypto delay samples: a TCB was found waiting on a cryptographic asynchronous message processor

• AP crypto using samples: a TCB was found executing on a cryptographic assist processor

• AP crypto delay samples: a TCB was found waiting on a cryptographic assist processor

Page 38September 2015 zExchange – Crypto Performance

Page 39: Crypto Performance: Expectations, Operations & Reporting

©

Common Address Space Work (SMF Type 30)

• SMF30CSC – ICSF Service Count• CSNBENC (Single-DES) - # of service calls, # of bytes, # of CMD

instructions• CSNBENC (Double & Triple-DES) - # of service calls, # of bytes, # of

CMD instructions• CSNBDEC (Single-DES) - # of service calls, # of bytes, # of CMD

instructions• CSNBDEC (Double & Triple-DES) - # of service calls, # of bytes, # of

CMD instructions• CSNBMGN (MAC Generate) - single and various double key MAC; # of

service calls, # of bytes, # of CMD instructions• CSNBMVR (MAC Verify) - single and various double key MAC; # of

service calls, # of bytes, # of CMD instructions• CSNBOWH (SHA-1) - # of Service calls, # of bytes, # of PCMF

instructions• CSNBOWH (SHA-256 which includes SHA-224) - # of Service calls , # of

bytes, # of PCMF instructions• CSNBOWH (SHA-512 which includes SHA-384) - # of Service calls , # of

bytes, # of PCMF instructions• CSNBPTR - # of Service calls• CSNBPVR - # of Service calls

Page 39September 2015 zExchange – Crypto Performance

Page 40: Crypto Performance: Expectations, Operations & Reporting

©

Omegamon

Page 40September 2015 zExchange – Crypto Performance

Page 41: Crypto Performance: Expectations, Operations & Reporting

©

Summary

• There is performance data available, but …• Your implementation will be the most significant

factor in terms of performance• Consider your ICSF options (and their impact on

performance)• Start collecting performance data now, and look for

trends• Hopefully the performance reporting will get better

September 2015 zExchange – Crypto Performance Page 41

Page 42: Crypto Performance: Expectations, Operations & Reporting

©

IBM Manuals & Redbooks

Page 42September 2015 zExchange – Crypto Performance

• SC14-7507 ICSF System Programmer’s Guide• SC34-2665 z/OS RMF Report Analysis 2.1• SA22-7630 z/OS System Measurement Facilities

(SMF)• SG24-6645 Effective zSeries Performance

Monitoring Using Resource Measurement Facility• REDP-4358 Monitoring System z Cryptographic

Services

Page 43: Crypto Performance: Expectations, Operations & Reporting

©

Crypto Performance Whitepapers• z13

• http://www.ibm.com/common/ssi/cgi-bin/ssialias?subtype=WH&infotype=SA&htmlfid=ZSW03283USEN&attachment=ZSW03283USEN.PDF

• zEC12• http://www.ibm.com/systems/z/advantages/security/zec12cryptography.ht

ml

• z196 and z10• http://www.ibm.com/systems/z/advantages/security/z10cryptography.html

Page 43

z/OS Communications Server performance index

September 2015 zExchange – Crypto Performance

• http://www.ibm.com/support/docview.wss?uid=swg27005524

Page 44: Crypto Performance: Expectations, Operations & Reporting

©

CPU Measurement Facility Doc

• IBM Research article• “IBM System z10 performance improvements with software

& hardware synergy”• http://www.research.ibm.com/journal/rd/531/jackson.pdf

• Contact IBM team for copy of the article

• Feb 2011 Hot Topics - A z/OS Newsletter - GA22-7501• “A whole lot of benefits from HIS data” article page 24

• Redpaper Setting Up and Using System z CPU Measurement Facility with z/OS

• http://www.redbooks.ibm.com/redpieces/pdfs/redp4727.pdf

Page 44September 2015 zExchange – Crypto Performance

Page 45: Crypto Performance: Expectations, Operations & Reporting

©

Questions …

Page 45September 2015 zExchange – Crypto Performance