Module: Google::Cloud::Kms::V1::CryptoKeyVersion::CryptoKeyVersionAlgorithm
- Defined in:
- proto_docs/google/cloud/kms/v1/resources.rb
Overview
The algorithm of the CryptoKeyVersion, indicating what parameters must be used for each cryptographic operation.
The GOOGLE_SYMMETRIC_ENCRYPTION algorithm is usable with CryptoKey.purpose ENCRYPT_DECRYPT.
Algorithms beginning with RSA_SIGN_
are usable with
CryptoKey.purpose
ASYMMETRIC_SIGN.
The fields in the name after RSA_SIGN_
correspond to the following
parameters: padding algorithm, modulus bit length, and digest algorithm.
For PSS, the salt length used is equal to the length of digest algorithm. For example, RSA_SIGN_PSS_2048_SHA256 will use PSS with a salt length of 256 bits or 32 bytes.
Algorithms beginning with RSA_DECRYPT_
are usable with
CryptoKey.purpose
ASYMMETRIC_DECRYPT.
The fields in the name after RSA_DECRYPT_
correspond to the following
parameters: padding algorithm, modulus bit length, and digest algorithm.
Algorithms beginning with EC_SIGN_
are usable with
CryptoKey.purpose
ASYMMETRIC_SIGN.
The fields in the name after EC_SIGN_
correspond to the following
parameters: elliptic curve, digest algorithm.
Algorithms beginning with HMAC_
are usable with
CryptoKey.purpose
MAC.
The suffix following HMAC_
corresponds to the hash algorithm being used
(eg. SHA256).
For more information, see Key purposes and algorithms.
Constant Summary collapse
- CRYPTO_KEY_VERSION_ALGORITHM_UNSPECIFIED =
Not specified.
0
- GOOGLE_SYMMETRIC_ENCRYPTION =
Creates symmetric encryption keys.
1
- AES_128_GCM =
AES-GCM (Galois Counter Mode) using 128-bit keys.
41
- AES_256_GCM =
AES-GCM (Galois Counter Mode) using 256-bit keys.
19
- AES_128_CBC =
AES-CBC (Cipher Block Chaining Mode) using 128-bit keys.
42
- AES_256_CBC =
AES-CBC (Cipher Block Chaining Mode) using 256-bit keys.
43
- AES_128_CTR =
AES-CTR (Counter Mode) using 128-bit keys.
44
- AES_256_CTR =
AES-CTR (Counter Mode) using 256-bit keys.
45
- RSA_SIGN_PSS_2048_SHA256 =
RSASSA-PSS 2048 bit key with a SHA256 digest.
2
- RSA_SIGN_PSS_3072_SHA256 =
RSASSA-PSS 3072 bit key with a SHA256 digest.
3
- RSA_SIGN_PSS_4096_SHA256 =
RSASSA-PSS 4096 bit key with a SHA256 digest.
4
- RSA_SIGN_PSS_4096_SHA512 =
RSASSA-PSS 4096 bit key with a SHA512 digest.
15
- RSA_SIGN_PKCS1_2048_SHA256 =
RSASSA-PKCS1-v1_5 with a 2048 bit key and a SHA256 digest.
5
- RSA_SIGN_PKCS1_3072_SHA256 =
RSASSA-PKCS1-v1_5 with a 3072 bit key and a SHA256 digest.
6
- RSA_SIGN_PKCS1_4096_SHA256 =
RSASSA-PKCS1-v1_5 with a 4096 bit key and a SHA256 digest.
7
- RSA_SIGN_PKCS1_4096_SHA512 =
RSASSA-PKCS1-v1_5 with a 4096 bit key and a SHA512 digest.
16
- RSA_SIGN_RAW_PKCS1_2048 =
RSASSA-PKCS1-v1_5 signing without encoding, with a 2048 bit key.
28
- RSA_SIGN_RAW_PKCS1_3072 =
RSASSA-PKCS1-v1_5 signing without encoding, with a 3072 bit key.
29
- RSA_SIGN_RAW_PKCS1_4096 =
RSASSA-PKCS1-v1_5 signing without encoding, with a 4096 bit key.
30
- RSA_DECRYPT_OAEP_2048_SHA256 =
RSAES-OAEP 2048 bit key with a SHA256 digest.
8
- RSA_DECRYPT_OAEP_3072_SHA256 =
RSAES-OAEP 3072 bit key with a SHA256 digest.
9
- RSA_DECRYPT_OAEP_4096_SHA256 =
RSAES-OAEP 4096 bit key with a SHA256 digest.
10
- RSA_DECRYPT_OAEP_4096_SHA512 =
RSAES-OAEP 4096 bit key with a SHA512 digest.
17
- RSA_DECRYPT_OAEP_2048_SHA1 =
RSAES-OAEP 2048 bit key with a SHA1 digest.
37
- RSA_DECRYPT_OAEP_3072_SHA1 =
RSAES-OAEP 3072 bit key with a SHA1 digest.
38
- RSA_DECRYPT_OAEP_4096_SHA1 =
RSAES-OAEP 4096 bit key with a SHA1 digest.
39
- EC_SIGN_P256_SHA256 =
ECDSA on the NIST P-256 curve with a SHA256 digest. Other hash functions can also be used: https://cloud.google.com/kms/docs/create-validate-signatures#ecdsa_support_for_other_hash_algorithms
12
- EC_SIGN_P384_SHA384 =
ECDSA on the NIST P-384 curve with a SHA384 digest. Other hash functions can also be used: https://cloud.google.com/kms/docs/create-validate-signatures#ecdsa_support_for_other_hash_algorithms
13
- EC_SIGN_SECP256K1_SHA256 =
ECDSA on the non-NIST secp256k1 curve. This curve is only supported for HSM protection level. Other hash functions can also be used: https://cloud.google.com/kms/docs/create-validate-signatures#ecdsa_support_for_other_hash_algorithms
31
- EC_SIGN_ED25519 =
EdDSA on the Curve25519 in pure mode (taking data as input).
40
- HMAC_SHA256 =
HMAC-SHA256 signing with a 256 bit key.
32
- HMAC_SHA1 =
HMAC-SHA1 signing with a 160 bit key.
33
- HMAC_SHA384 =
HMAC-SHA384 signing with a 384 bit key.
34
- HMAC_SHA512 =
HMAC-SHA512 signing with a 512 bit key.
35
- HMAC_SHA224 =
HMAC-SHA224 signing with a 224 bit key.
36
- EXTERNAL_SYMMETRIC_ENCRYPTION =
Algorithm representing symmetric encryption by an external key manager.
18