Updated on 2025-09-24 GMT+08:00

Overview

For asymmetric encryption and decryption, a public key and a private key are required. In cryptography, these two keys are a pair of bidirectional keys. That is, either the public key or the private key can be used for encryption, and only the other one can be used for decryption. The public key can be set to public, while the private key must be kept securely.

Asymmetric encryption does not require reliable key distribution channels. It is usually used between systems with different trust levels to implement encrypted transmission of sensitive data or digital signature verification.

Asymmetric Key Type

Table 1 lists the asymmetric key algorithms supported by KMS.

Table 1 Asymmetric key algorithms supported by KMS

Key Type

Algorithm Type

Key Specifications

Description

Application

Asymmetric key

RSA

  • RSA_2048
  • RSA_3072
  • RSA_4096

RSA asymmetric key

  • Digital signature and signature verification
  • Data encryption and decryption
    NOTE:

    Asymmetric keys are applicable to signature and signature verification scenarios. Asymmetric keys are not efficient enough for data encryption. Symmetric keys are suitable for encrypting and decrypting data.

Asymmetric key

ECC

  • EC_P256
  • EC_P384

Elliptic curve recommended by NIST

Digital signature and signature verification

Typical Scenarios of Asymmetric Encryption

Asymmetric encryption and decryption can be used for encrypted communication and digital signature.