Skip to Main Content
IBM Power Ideas Portal


This portal is to open public enhancement requests against IBM Power Systems products, including IBM i. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

Status Delivered
Workspace IBM i
Categories Db2 for i
Created by Guest
Created on Jun 3, 2019

256-bit Encryption for ENCRYPT_AES SQL Function

Please add in support for 256-bit encryption with the ENCRYPT_AES SQL statement.


Use Case:

Higher encryption is more secure. 256-bit encryption is harder to break than the currently supported 128-bit encryption.


Idea priority High
  • Guest
    Reply
    |
    Nov 16, 2023
    This enhancement was delivered in November 2023 with IBM i 7.5 PTF Group level 5 and IBM i 7.4 PTF Group level 26.

    A new built-in scalar function, ENCRYPT_AES256, has been added to SQL.It uses the AES encryption algorithm with a 256-bit encryption key.

    You can read about it on the fact page here: https://www.ibm.com/support/pages/node/7031285
    And in IBM Documentation here: https://www.ibm.com/docs/en/i/7.5?topic=functions-encrypt-aes256

    Db2 for i development team
    IBM Power Systems Development
  • Guest
    Reply
    |
    Jul 18, 2023

    I think the function provided with ENCRYPT_AES should be enhanced to be more in line with the capabilities of Qc3EncryptWithMAC API. The SQL function is actually pretty weak now that I see what the APIs can do that the SQL functions do not do. In particular:


    * The API allows a random nonce to be provided so that when encrypting the same value multiple times, you don't get the same encrypted value for the same clear text. Attackers can see that a message is being repeated when the SQL approach is used, which reveals information. The SQL function could either accept a Nonce parameter or generate a random one (using a crypto class random number generator !)


    * The APIs support the MAC (Message Authentication Code) which protects against an attacker tweaking the cipher text and still allowing it to be decrypted with a slightly modified clear text result. (Classic example being able to change a dollar amount in a banking transaction.) The API will refuse to decrypt a message that has been altered. The SQL function will happily do so, producing a degree of gibberish in the result (if only trailing few bytes are changed I believe only trailing 16 chars are affected at most, based upon my experimentation.)


    The documentation for the SQL encrypt functions really ought to layout the lack of strong security and new stronger SQL functions more closely matching the APIs above should be created.

    You should also document what AES mode is being used -- For example, in some AES modes, if the same 16 byte are repeated in the clear text, then the same 16 bytes will be repeated in the encrypted value. Other modes address this issue and should be used.


  • Guest
    Reply
    |
    Dec 17, 2019

    The CAAC has reviewed this requirement and recommends that IBM view this as a high priority requirement that is important to be addressed. Having better Security options is desirable.

    Background: The COMMON Americas Advisory Council (CAAC) members have a broad range of experience in working with small and medium-sized IBM i customers. CAAC has a key role in working with IBM i development to help assess the value and impact of individual RFEs on the broader IBM i community, and has therefore reviewed your RFE.

    For more information about CAAC, see www.common.org/caac

    For more details about CAAC's role with RFEs, see http://www.ibmsystemsmag.com/Blogs/i-Can/May-2017/COMMON-Americas-Advisory-Council-%28CAAC%29-and-RFEs/

    Nancy Uthke-Schmucki - CAAC Program Manager

  • Guest
    Reply
    |
    Jun 6, 2019

    Due to processing by IBM, this request was reassigned to have the following updated attributes:
    Brand - Servers and Systems Software
    Product family - Power Systems
    Product - IBM i
    Component - Db2 for i
    Operating system - IBM i
    Source - None

    For recording keeping, the previous attributes were:
    Brand - Servers and Systems Software
    Product family - Power Systems
    Product - IBM i
    Component - Application Development
    Operating system - IBM i
    Source - None