Basic Concepts
To help you understand and use DEW better, this document describes the related basic terms.
Term |
Definition |
More info |
---|---|---|
Symmetric key encryption |
Symmetric key encryption is also called dedicated key encryption. The sender and receiver use the same key to encrypt and decrypt data. Advantage: Encryption and decryption are fast. Disadvantage: Each pair of keys must be unique. Key management is difficult if there are a large number of users. Scenario: Encrypt a large amount of data. |
|
Asymmetric key encryption |
Asymmetric key encryption is also called public key encryption. A pair of keys are used for encryption and decryption. One is a public key, and the other is a private key. Advantage: Different keys are used for encryption and decryption, enhancing security. Disadvantage: Encryption and decryption are slow. Scenario: Encrypt sensitive information. |
|
Hash-based Message Authentication Code (HMAC) |
HMAC combines information with keys and encrypts the result using a hash function to protect information integrity and verify information. |
- |
Digital signature |
A digital signature is also known as a public key digital signature, which is used to verify the authenticity and integrity of a message. After a message is encrypted using a private key and is sent, the receiver uses a public key to decrypt the message. The security of electronic files are protected by comparing the signature information. |
- |
Item |
Definition |
Reference |
---|---|---|
Hardware Security Module (HSM) |
An HSM is a type of computer hardware that protects and manages the keys used by strong authentication systems and provides related cryptographic operations. |
- |
Customer Master Key (CMK) |
A CMK is a Key Encryption Key (KEK) created by a user or cloud service using KMS. It is used to encrypt and protect Data Encryption Keys (DEKs). One CMK can be used to encrypt one or more DEKs. CMKs are categorized into custom keys and default keys. |
|
Default key |
A default key is automatically created by another cloud service using KMS, such as Object Storage Service (OBS). The alias of a default key ends with /default. |
|
Key material |
Key materials are important input for cryptographic operations. A CMK consists of a key ID, metadata, and a key material. |
- |
Envelope encryption |
Envelope encryption is the practice of encrypting data with a DEK and then encrypting the DEK with a root key that you can fully manage. In this case, CMKs are not required for encryption or decryption. |
|
Data Encryption Key (DEK) |
A DEK is used to encrypt data. |
Term |
Definition |
More info |
---|---|---|
SSH key pair |
An SSH key pair is used for encrypting and verifying SSH network connections. Each SSH key pair consists of a private key and a public key.
The private key can be accessed only by the owner and the public key can be shared with others. As a result, SSH key pairs are more secure than conventional password verification. |
|
Private key pair |
A private key pair can be viewed or used only by the current account. |
|
Account key pair |
An account key pair can be viewed or used by all users under the account. |