Overview
For asymmetric encryption and decryption, a public key and a private key are required. In cryptography, these two keys are a pair of bidirectional keys. That is, either the public key or the private key can be used for encryption, and only the other one can be used for decryption. The public key can be set to public, while the private key must be kept securely.
Asymmetric encryption does not require reliable key distribution channels. It is usually used between systems with different trust levels to implement encrypted transmission of sensitive data or digital signature verification.
Asymmetric Key Type
Table 1 lists the asymmetric key algorithms supported by KMS.
Key Type |
Algorithm Type |
Key Specifications |
Description |
Application |
---|---|---|---|---|
Asymmetric key |
RSA |
|
RSA asymmetric key |
|
Asymmetric key |
ECC |
|
Elliptic curve recommended by NIST |
Digital signature and signature verification |
Typical Scenarios of Asymmetric Encryption
Asymmetric encryption and decryption can be used for encrypted communication and digital signature.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.