Keys
Keys serve as the secure communication and information security, functioning as essential digital elements. Their critical role involves encrypting and decrypting data, confirming identities, and upholding the security triad of confidentiality, integrity, and authenticity for information.
There are different kinds of key, widely used to for encryption algorithm, for increasing the security efficiency of protecting data.
The Keys that are available in ezto verify are,
- aes-generated
- ecdsa-generated
- hmac-generated
- java-keystore
- rsa
- rsa-enc
- rsa-enc-generated
- rsa-generated
- The Advanced Encryption Standard (AES) is a highly symmetric encryption algorithm renowned for its security and efficient data protection capabilities.
- When data or content is designated as "AES-generated," it indicates that AES encryption or encryption-related methods have been employed to safeguard it.
Manage `aes-generated`
Name | Description |
---|
Console Display Name | This field represents the display name of the provider when linked in the admin console. |
Priority | Priority level assigned to the provider. |
Enable | Indicates whether the keys are enabled or not. |
Active | Indicates whether the keys can be used for signing. |
AES Key Size | This field specifies the size in bytes for the generated AES Key. A size of 16 corresponds to AES-128, a size of 24 corresponds to AES-192, and a size of 32 corresponds to AES-256. Note: Some JDK implementations may not allow keys larger than 128 bits; caution is advised. |
- After providing the above configurations, click on the
SAVE
button.
- It commonly denotes something that has been produced or formed through the utilization of the Elliptic Curve Digital Signature Algorithm (ECDSA). It is widely adopted cryptographic technique employed for generating digital signatures and confirming their legitimacy.
Manage `ecdsa-generated`
Name | Description |
---|
Console Display Name | This field represents the display name of the provider when linked in the admin console. |
Priority | Priority level assigned to the provider. |
Enable | Indicates whether the keys are enabled or not. |
Active | Indicates whether the keys can be used for signing. |
Elliptic Curve | Mention the Elliptic Curve employed in ECDSA. |
- After providing the above configurations, click on the
SAVE
button.
It generally denotes an entity or data that has been generated or formed using the Hash-based Message Authentication Code (HMAC) algorithm.
Manage `hmac-generated`
Name | Description |
---|
Console Display Name | This field represents the display name of the provider when linked in the admin console. |
Priority | Priority level assigned to the provider. |
Enable | Indicates whether the keys are enabled or not. |
Active | Indicates whether the keys can be used for signing. |
Secret Size | The size in bytes for the generated secret. |
Algorithm | The intended algorithm for the key. |
- After providing the above configurations, click on the
SAVE
button.
- A java keyStore, commonly known as "JKS," serves as a storage facility for cryptographic keys, certificates, and other confidential security-related information.
- It forms an integral part of Java's security framework, finding extensive applications in securing communication, authenticating users and systems, and maintaining data integrity.
Manage `java-keystore`
Name | Description |
---|
Console Display Name | This field represents the display name of the provider when linked in the admin console. |
Priority | Priority level assigned to the provider. |
Enable | Indicates whether the keys are enabled or not. |
Active | Indicates whether the keys can be used for signing. |
Algorithm | The intended algorithm for the key. |
Keystore | Path to the keys file. |
Keystore Password | Password for accessing the keys. |
Key Alias | Alias for the private key. |
Key Password | Password for the private key. |
Key Use | Specifies whether the key should be used for signing or encryption. |
- After providing the above configurations, click on the
SAVE
button.
- RSA, stands as a prominent public-key encryption and digital signature algorithm within the realm of cryptography.
- RSA persists as an integral cornerstone of contemporary secure communication and information security solutions.
Manage `rsa`
Name | Description |
---|
Console Display Name | This field represents the display name of the provider when linked in the admin console. |
Priority | Priority level assigned to the provider. |
Enable | Indicates whether the keys are enabled or not. |
Active | Indicates whether the keys can be used for signing. |
Private RSA Key | The Private RSA Key encoded in PEM format. |
X509 Certificate | The X509 Certificate encoded in PEM format. |
Algorithm | The intended algorithm for the key. |
- After providing the above configurations, click on the
SAVE
button.
- It commonly denotes RSA encryption, a cryptographic technique that employs the RSA algorithm to safeguard data by transforming it into an indecipherable format, only accessible with the corresponding private key.
Manage rsa-enc
Name | Description |
---|
Console Display Name | This field represents the display name of the provider when linked in the admin console. |
Priority | Indicates the priority level assigned to the provider. |
Enable | Specify whether the keys are enabled or not. |
Active | Specify whether the keys can be used for signing. |
Private RSA Key | The Private RSA Key encoded in PEM format. |
X509 Certificate | The X509 Certificate encoded in PEM format. |
Algorithm | Denotes the intended algorithm for the key. |
- After providing the above configurations, click on the
SAVE
button.
- It generally describes an entity or data that has been generated or produced using RSA encryption.
- RSA encryption relies on the RSA algorithm to protect data by transforming it into an unreadable format, that can only be deciphered using the matching private key.
Name | Description |
---|
Console Display Name | This field represents the display name of the provider when linked in the admin console. |
Priority | Indicates the priority level assigned to the provider. |
Enable | Specify whether the keys are enabled or not. |
Active | Specify whether the keys can be used for signing. |
Key Size | The size in bytes for the generated secret. |
Algorithm | Denotes the intended algorithm for the key. |
- After providing the above configurations, click on the
SAVE
button.
- It generally refers to something that has been produced or created using the RSA encryption algorithm.
- RSA encryption employs mathematical techniques to secure data by converting it into an encrypted format that can only be deciphered with the associated private key.
Name | Description |
---|
Console Display Name | This field specifies the display name of the provider when linked in the admin console. |
Priority | Indicates the priority assigned to the provider. |
Enable | Set this option to determine if the keys are enabled. |
Active | Set this option to determine if the keys can be used for signing. |
Key Size | Indicates the size in bytes of the generated secret. |
Algorithm | Denotes the intended algorithm for the key. |
- After providing the above configurations, click on the
SAVE
button.