Asymmetric Key Pair
A matching public/private key pair whereby anyone can encrypt with the public key but only those who hold the private key can decrypt.Public
The public key in a asymmetric key pair.Private
Private keys may be part of a public/private asymmetric key pair. Alternatively, they can be used in symmetric encryption whereby you use the same key to encrypt and decrypt data. Private keys are generally kept secret.Signature Keys
Keys that are used to generate digital signatures for verifying identity, determining the integrity of data and non-repudiation.Authentication Keys
Keys that are used to verify identity, communications and data.Wrapping Keys
Keys that are used to encrypt other keys. For example, it is common to use public/private asymmetric keys for an initial exchange of symmetric private keys. This is done because symmetric encryption is generally faster than public key encryption.Transport Key
Basically another term for a wrapping key. Transport keys are used to encrypt transport messages that contain other keys.Key Agreement Key
Another term for keys that are used to exchange other keys.Ephemeral Key
A temporary key that is typically used to establish other keys.Transient Key
An asymmetric public/private key pair that is only used once. This may be done in order to implement functionality such as the ability to irrefutably identify the time that a digital signature was created.Master Key
A key that is used to generate other keys using a key derivation function.Authorization Keys
Authorization keys are used to provide a privilege. In many cases, these are used to prove that a message has been successfully decrypted. If you encrypt an authorization key with a public key you know that a client is in possession of the corresponding private key because they are able to send the authorization key back to you.Overview: Cryptographic Keys | ||
Type | ||
Definition | Parameters that are used to lock or unlock cryptographic functions such as encryption, authentication and authorization. | |
Related Concepts |