The PIN functions, with an early commercial encryption using the DES algorithm, were implemented in two modules - BQKPERS and BQKCIPH - and their export controlled under the US export munitions rules.
IBM | IBM PC compatible | IBM DB2 | IBM mainframe | IBM System/360 | IBM Personal Computer | IBM System/370 | IBM AIX | IBM WebSphere | IBM Selectric typewriter | IBM Research | IBM Rational Quality Manager | IBM Personal Computer/AT | IBM 7090 | IBM's | IBM Notes | IBM Information Management Software | IBM Almaden Research Center | IBM AIX (operating system) | IBM 704 | IBM 3745 | IBM 3270 | IBM WebSphere MQ | IBM Tivoli Storage Manager | IBM System x | IBM Systems Network Architecture | IBM System i | IBM System/3 | IBM Lotus Domino | IBM Future Systems project |
In 2002 two PhD students at Cambridge University, Piotr Zieliński and Mike Bond, discovered a decimalization table attack in the PIN verification system of the IBM 3624, which was duplicated in most later hardware.