Download presentation
Presentation is loading. Please wait.
1
Cryptographic Usage Mask
Nitin Jain ( Safenet )
2
Usage Mask Table Currently in KMIP spec usage masks are not briefed clearly under Cryptographic Usage Mask attribute. Add below table in KMIP spec to understand the usage masks with example. Note: Request to remove Usage Masks marked with red. Usage Mask Description Example 1 Sign Key can be used for Signing the Data. Private Key 2 Verify Key can be used for Verification of Data. Public Key 3 Encrypt Key can be used to Encrypt the Data. Symmetric and Public Key 4 Decrypt Key can be used to Decrypt the Data. Symmetric and Private Key 5 Wrap Key Key can be used to Wrap a Key. Symmetric Key 6 Unwrap Key Key can be used to Unwrap a Key. 7 Export This is ambiguous but one thing for sure that this is not for exporting the Key Material (should be deprecated and removed from spec) 8 MAC Generate Key can be used to MAC the Data. 9 MAC Verify Key can be used to MAC Verify the Data. 10 Derive Key Key can be used to Derive a Key. Symmetric Key and Secret Data
3
Should be deprecated and removed from spec
Usage Mask Table Usage Mask Description Example 11 Content Commitment Key can be used for verify digital signatures. Public Key 12 Key Agreement Key can be used for key agreement. 13 Certificate Sign Key can be used for verifying signatures on public key certificates. 14 CRL Sign Key can be used for verifying signatures on certificate revocation lists 15 Generate Cryptogram Should be deprecated and removed from spec 16 Validate Cryptogram 17 Translate Encrypt 18 Translate Decrypt 19 Translate Wrap 20 Translate Unwrap
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.