Key Types and Algorithms
Learn what key types and algorithms are supported for the Dedicated Key Management JCE provider.
Key Types and Algorithms
Key Type | Description |
---|---|
AES | Generate symmetric AES keys with sizes of 128, 192, and 256 bits. AES (Advanced Encryption Standard) is widely used for securing sensitive data in various encryption applications. |
Triple DES (3DES, DESede) | Generate a 192-bit Triple DES (3DES) key, providing enhanced security over standard DES. This key type is supported only on Non-FIPS (Federal Information Processing Standards) clusters and is commonly used for legacy applications. |
EC (Elliptic Curve) | Generate elliptic curve (EC) key pairs based on NIST-defined curves. Supported curves include secp224r1 (P-224), secp256r1 (P-256), secp256k1 (Blockchain), secp384r1 (P-384), and secp521r1 (P-521). These EC keys are typically used in modern cryptographic protocols, such as SSL/TLS and blockchain technologies. |
RSA | Generate RSA key pairs ranging from 2048-bit to 4096-bit, in increments of 256 bits. RSA is a widely-used asymmetric encryption algorithm for securing communications, with larger key sizes providing stronger security. |
Message Digest | Generate cryptographic hash values for data integrity verification. Supported algorithms include SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, which produce fixed-length digests from arbitrary data. |
HMAC (Hash-based Message Authentication Code) | Generate HMAC keys for cryptographic hash functions: SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512. HMAC is used for verifying data integrity and authenticity by applying a secret key with a hash function. |
CMAC (Cipher-based Message Authentication Code) | Generate CMACs using block ciphers (e.g., AES) to produce an authentication code that ensures message integrity and authenticity. CMAC operates similarly to HMAC but uses a symmetric key cipher for the cryptographic operation. Supported algorithms include AesCMAC. |