Overview
KMS allows you to manage the lifecycle of keys and encrypt and decrypt data.
The core key components in KMS include customer master keys (CMKs) and data encryption keys (DEKs). CMK, the top-level key of the user, is used to encrypt and decrypt sensitive data and generate DEKs. DEK, the second-level key in the envelop encryption process, is used to encrypt service and is protected by CMKs.
Key Types
KMS provides default keys, custom keys, and external keys to meet security and compliance requirements in different service scenarios. The following table lists the details.
Key Type |
Scenario |
Function |
Algorithm Type |
Key Specifications |
Description |
---|---|---|---|---|---|
Used by cloud services for server-side encryption. For details, see Cloud Services Integrated with KMS. |
Only data encryption and decryption are supported. |
AES |
AES_256 |
Default keys are created and managed by KMS. The alias of a default key ends with /default. |
|
|
Data encryption, decryption, and digital signature are supported. |
AES SHA RSA ECC |
For details, see Key Algorithms and Specifications Supported by KMS. |
You can create a key and manage its lifecycle on KMS, which generates key materials. |
|
|
Data encryption, decryption, and digital signature are supported. |
AES RSA ECC |
For details, see Key Algorithms and Specifications Supported by KMS. |
You can create a key and manage its lifecycle on KMS. You need to import the key materials. |
Key Algorithms and Specifications Supported by KMS
Key Type |
Algorithm Type |
Key Specifications |
Description |
Scenario |
---|---|---|---|---|
Symmetric key |
AES |
AES_256 |
AES symmetric key |
|
Digest key |
SHA |
|
Digest key |
|
Asymmetric key |
RSA |
|
RSA asymmetric key |
|
Asymmetric key |
ECC |
|
Elliptic curve recommended by NIST |
Digital signature and signature verification |
Table 3 describes the encryption and decryption algorithms supported for user-imported keys.
Algorithm |
Description |
Configuration |
---|---|---|
RSAES_OAEP_SHA_256 |
RSA algorithm that uses OAEP and has the SHA-256 hash function |
Select an algorithm based on your HSM functions. If the HSMs support the RSAES_OAEP_SHA_256 algorithm, use RSAES_OAEP_SHA_256 to encrypt key materials.
NOTICE:
The RSAES_OAEP_SHA_1 algorithm is no longer secure. Exercise caution when performing this operation. |
RSAES_OAEP_SHA_1 |
RSA algorithm that uses Optimal Asymmetric Encryption Padding (OAEP) and has the SHA-1 hash function |
KMS-Created and Imported Key Materials
- When you create a custom key on the KMS console, KMS automatically generates a key material for the key.
- If you want to use your own key material, set Source to External when you create a key on KMS, and import the key material.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.