Intel 170 Servers User Manual

Page of 368
y
Supported number of 4764 Cryptographic Coprocessors:
8
8
IBM System i5 520, 550, 570 2/4W
8
32
IBM System i5 570 8/12/16W, 595
Maximum per partition
Maximum per server
server models
Table 8.8
y
Applications requiring a FIPS 140-2 Level 4 certified, tamper resistant module for storing
cryptographic keys should use the IBM 4764 Cryptographic Coprocessor. 
y
Cryptographic functions demand a lot of a system CPU, but the performance does scale well when
you add a CPU to your system. If your CPU handles a large number of cryptographic requests,
offloading them to an IBM 4764 Cryptographic Coprocessor might be more beneficial then adding a
new CPU.
8.6 Additional Information 
Extensive information about using System i Cryptographic functions may be found under “Security” and
“Networking Security” at the System i Information Center web site at:  
IBM Security and Privacy specialists work with customers to assess, plan, design, implement and manage
a security-rich environment for your online applications and transactions. These Security, Privacy,
Wireless Security and PKI services are intended to help customers build trusted electronic relationships
with employees, customers and business partners. These general IBM security services are described at:
General security news and information are available at:  
System i Security White Paper, “Security is fundamental to the success of doing e-business” is available
at:
IBM Global Services provides a variety of Security Services for customers and Business Partners. Their
services are described at:  
Links to other Cryptographic Coprocessor documents including custom programming information can be
found at:  
Other performance information can be found at the System i Performance Management website at: 
More details about POWER5 and SMT can be found in the document Simultaneous Multi-Threading
(SMT) on eServer iSeries POWER5 Processors
 at: 
IBM i 6.1 Performance Capabilities Reference - January/April/October 2008
©
 Copyright IBM Corp. 2008
Chapter 8 Cryptography Performance
148