Key Types
Master Key
A master key, the highest level of keys in a cryptographic system, generates and manages other keys, including session keys and data encryption keys, or directly encrypts important data. It is vital to protect its security and confidentiality. Once a master key is leaked, the entire cryptographic system may be severely threatened.
A master key features the following:
- High security: A master key is generally the most sensitive key in a system and needs to be strictly protected. It is usually stored in a secure hardware device, such as an HSM.
- Long-term use: A master key has a long lifecycle and will not be frequently changed to ensure system stability and consistency.
- Multi-usage: A master key can be used for various encryption operations, including subkey generation, data encryption, and signature verification.
- Uniqueness: A master key is unique in a cryptographic system. In a distributed system, each node or region may have its own master key.
Master keys include custom keys and default keys. You can create, view, enable, disable, schedule the deletion of, and cancel the deletion of custom keys.
- Symmetric keys are most commonly used for data encryption protection.
- Asymmetric keys are used for digital signature verification or sensitive information encryption in systems where the trust relationship is not mutual. An asymmetric key consists of a public key and a private key. The public key can be sent to anyone. The private key must be securely stored and only accessible to trusted users.
- An asymmetric key can be used to generate and verify a signature. To securely transfer data, a signer sends the public key to a receiver, uses the private key to sign data, and then sends the data and signature to the receiver. The receiver can use the public key to verify the signature.
Key Algorithms Supported by KMS
|
Key Type |
Algorithm Type |
Key Specifications |
Description |
Application Scenario |
|---|---|---|---|---|
|
Symmetric key |
AES |
AES_256 |
AES symmetric key |
|
|
Asymmetric key |
RSA |
|
RSA asymmetric password |
|
|
ECC |
|
Elliptic curve recommended by NIST |
Digital signature and signature verification |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot