Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Todd W. Arnold is active.

Publication


Featured researches published by Todd W. Arnold.


Ibm Journal of Research and Development | 2012

IBM 4765 cryptographic coprocessor

Todd W. Arnold; Carl Ugo Buscaglia; F. Chan; Vincenzo Condorelli; John C. Dayka; W. Santiago-Fernandez; Nihad Hadzic; Michael David Hocker; Michael J. Jordan; T. E. Morris; Klaus Werner

This paper provides an overview of the 4765 cryptographic coprocessor hardware and firmware architecture, its key design features, and an overview of the IBM System z® secure software stack. The hardware for the 4765 solution is shared across all IBM server platforms offering cryptographic hardware acceleration in a highly programmable coprocessor environment designed to meet the most stringent security requirements. Its internal hardware and firmware can be easily updated to meet new security standards and requirements, as well as new customer-specific functionality. It allows updates and customization to be executed with zero downtime, meeting the highest standard of reliability and availability. Standard cryptographic functions and specialized banking and financial functions are supported.


Ibm Journal of Research and Development | 2007

Cryptographic system enhancements for the IBM System z9

Todd W. Arnold; Anne Dames; Michael David Hocker; Mark D. Marik; Nancy A. Pellicciotti; Klaus Werner

IBM has offered hardware-based cryptographic processors for its mainframe computers for nearly thirty years. Over that period, IBM has continued to update both the hardware and software, providing added features, higher performance, greater physical security, and improved management features. This commitment continues with the System z9TM, as demonstrated by the two improvements described in this paper. The first part of the paper describes enhancements to the System z9 to configure and control cryptographic features. The second part describes a new method for the cryptographic coprocessors to securely manage keys which are distributed to remote devices that are not necessarily in secure or well-controlled environments.


Archive | 1991

Transaction system security method and apparatus

Dennis G. Abraham; Steven George Aden; Todd W. Arnold; Steven William Neckyfarow; William S Rohland


Archive | 1999

Apparatus and method for secure distribution of data

Todd W. Arnold


Archive | 1997

Method and apparatus for protecting application data in secure storage areas

Todd W. Arnold


Archive | 1995

Access control apparatus and method

Todd W. Arnold


Archive | 1999

Method and system for providing limited-life machine-specific passwords for data processing systems

Todd W. Arnold; David Carroll Challener


Ibm Journal of Research and Development | 2004

The IBM PCIXCC: a new cryptographic coprocessor for the IBM eServer

Todd W. Arnold; L. P. Van Doom


Archive | 2006

Method for controlling security function execution with a flexible, entendable, and non-forgable block

Todd W. Arnold; Elizabeth A. Dames; Carsten D. Frehr; Kurt S. Jacobsen; Michael J. Kelly; Mark D. Marik; Jesper Wiese


Archive | 1995

System and method for secure storage and distribution of data using digital signatures

Todd W. Arnold

Researchain Logo
Decentralizing Knowledge