Key Types
CMKs include custom keys and default keys. This section describes how to create, view, enable, disable, schedule the deletion, and cancel the deletion of custom keys.
Custom keys can be categorized into symmetric keys and asymmetric keys.
Symmetric keys are most commonly used for data encryption protection. Asymmetric keys are used for digital signature verification or sensitive information encryption in systems where the trust relationship is not mutual. An asymmetric key consists of a public key and a private key. The public key can be sent to anyone. The private key must be securely stored and only accessible to trusted users.
An asymmetric key can be used to generate and verify a signature. To securely transfer data, a signer sends the public key to a receiver, uses the private key to sign data, and then sends the data and signature to the receiver. The receiver can use the public key to verify the signature.
Key Type |
Algorithm Type |
Key Specifications |
Description |
Usage |
---|---|---|---|---|
Symmetric key |
AES |
|
AES symmetric key |
Encrypts and decrypts a small amount of data or data keys. |
Digest key |
SHA |
|
SHA digest key |
|
Digest key |
SM3 |
|
SM3 digest key |
|
Asymmetric key |
RSA |
|
RSA asymmetric password |
Encrypts and decrypts a small amount of data or creates digital signatures. |
ECC |
|
Elliptic curve recommended by NIST |
Digital signature |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot