DEK - Data Encryption Key
A Data Encryption Key (DEK) is a symmetric cryptographic key used specifically to encrypt and decrypt the actual user data (payload) on IBM z/OS systems. Unlike Key Encrypting Keys (KEKs), which protect other keys, the DEK's primary role is the direct protection of sensitive information stored in files, databases, or transmitted across networks. A Data Encryption Key (DEK) is a symmetric cryptographic key used to directly encrypt and decrypt application data on IBM z/OS systems. It is the "working key" that performs the actual cryptographic transformation of sensitive information, whether at rest or in transit. DEKs are typically managed and protected by higher-level Key Encryption Keys (KEKs) and the Integrated Cryptographic Service Facility (ICSF).
Key Characteristics
-
- Symmetric Key: The same DEK is used for both the encryption and decryption processes, requiring secure distribution and management.
- Data-Specific: DEKs are designed to encrypt the raw data itself, such as records in a VSAM file, columns in a DB2 table, or application-specific data fields.
- Often Encrypted by KEKs: For secure storage and transmission, DEKs are typically encrypted by a stronger Key Encrypting Key (KEK) when managed by
ICSF(Integrated Cryptographic Service Facility). - Hardware-Assisted Operations: On z/OS, the actual encryption and decryption operations using DEKs are frequently offloaded to specialized cryptographic hardware, such as
Crypto Expressadapters, for enhanced performance and security. - Variable Lifetime: DEKs can have varying lifespans, from short-lived session keys to longer-lived keys associated with specific files, datasets, or database tables.
- Algorithm Agnostic: While the DEK itself is just a key, it's used with symmetric algorithms like AES (Advanced Encryption Standard) with common key lengths (e.g., 128-bit, 256-bit).
Use Cases
-
- Database Column/Table Encryption: Encrypting sensitive data within
DB2orIMSdatabases, where specific columns or entire tables are protected using a DEK. - Dataset Encryption: Protecting sensitive sequential files,
VSAMdatasets, orGDGs(Generation Data Groups) stored on DASD or tape, often as part of a Data at Rest Encryption (DARE) strategy. - Application-Level Encryption:
COBOLorPL/Iapplications leveragingICSFAPIs to generate and use DEKs for encrypting specific data fields before storing them or transmitting them over unsecured channels. - Secure Data Exchange: Encrypting data payloads before transmission to other systems or applications, ensuring confidentiality during transit.
- Tape Encryption: Used in conjunction with tape management systems to encrypt data written to physical or virtual tape volumes.
- Database Column/Table Encryption: Encrypting sensitive data within
Related Concepts
DEKs are a fundamental component of the z/OS cryptographic ecosystem, working closely with ICSF, which provides the framework for key management and cryptographic services. They are typically protected by KEKs (Key Encrypting Keys) when stored in key repositories like the CKDS (Cryptographic Key Dataset) or PKDS (Public Key Dataset), ensuring the confidentiality of the DEK itself. The actual cryptographic operations involving DEKs are often performed by Crypto Express hardware adapters, which are managed by ICSF, providing a secure and high-performance environment for data protection.
- Leverage ICSF: Always use
ICSFfor DEK generation, management, and cryptographic operations to benefit from hardware-assisted security and performance features. - Protect DEKs with KEKs: Never store DEKs in the clear. Ensure they are encrypted by strong
KEKswhen stored inCKDS,PKDS, or any other key repository. - Regular Key Rotation: Implement a robust key rotation policy for DEKs to limit the amount of data encrypted by a single key, thereby reducing the impact of a potential key compromise.
- Strict Access Control: Enforce stringent
RACF(Resource Access Control Facility) or equivalent security controls over who can generate, access, or use DEKs and theICSFservices that manage them. - Utilize Hardware Cryptography: Configure applications and
ICSFto utilizeCrypto Expressadapters for all DEK-based encryption and decryption to maximize security, performance, and compliance.