About 1,148,397 results (4,943 milliseconds)

What is encryption and how does it work? | Google Cloud

https://cloud.google.com/learn/what-is-encryption
Asymmetric encryption, also known as public-key cryptography, uses two separate keys to encrypt and decrypt data. One is a public key shared among all parties ...

Create a key | Cloud KMS | Google Cloud

https://cloud.google.com/kms/docs/create-key
Jan 1, 2023 ... Create a symmetric encryption key · In the Google Cloud console, go to the Key Management page. · Click the name of the key ring for which you ...

Encrypting and decrypting data with an asymmetric key | Cloud KMS ...

https://cloud.google.com/kms/docs/encrypt-decrypt-rsa
Replace public-key-path with the path and file name where you downloaded the public key. ... // For other key algorithms: // https://docs.oracle.com/javase ...

Cloud KMS resources | Google Cloud

https://cloud.google.com/kms/docs/resource-hierarchy
In asymmetric encryption or signing, the key consists of a public key and a ... A key ring's name does not need to be unique across a Google Cloud ...

Asymmetric encryption | Cloud KMS | Google Cloud

https://cloud.google.com/kms/docs/asymmetric-encryption
Symmetric encryption, on the other hand, uses the same key to encrypt and decrypt data. Asymmetric encryption workflow. The following describes the flow for ...

Retrieve a public key | Cloud KMS | Google Cloud

https://cloud.google.com/kms/docs/retrieve-public-key
You might also be able to get these permissions with custom roles or other predefined roles. ... Click the name of the key for which you want to retrieve the ...

Key purposes and algorithms | Cloud KMS | Google Cloud

https://cloud.google.com/kms/docs/algorithms
The following table lists the possible algorithms for elliptic curve keys with purpose ASYMMETRIC_SIGN. Use the lower-case algorithm names with the gcloud ...

Encrypt with an asymmetric key | Cloud KMS | Google Cloud

https://cloud.google.com/kms/docs/samples/kms-encrypt-asymmetric
Create(); // Build the key version name. CryptoKeyVersionName keyVersionName ... // For other key algorithms: // https://docs.oracle.com/javase/7/docs ...

Key wrapping | Cloud KMS | Google Cloud

https://cloud.google.com/kms/docs/key-wrapping
If your source HSM (or other key provider if not using HSM) does not support the RSA AES key wrap mechanism, you need to manually wrap your key material using ...

Google's Threat model for Post-Quantum Cryptography - Google ...

https://bughunters.google.com/blog/5108747984306176/google-s-threat-model-for-post-quantum-cryptography
Mar 11, 2024 ... ... term quantum computers. (See "Reassessing ... Another one of the more important asymmetric encryption protocols is key import for HSMs.

US9866391B1 - Permissions based communication - Google Patents

https://patents.google.com/patent/US9866391B1/en
... name's public key (i.e., the sender public key). Validating the signature ... The two separate keys may be different from one another and may form a key pair.

Import a key version into Cloud KMS | Google Cloud

https://cloud.google.com/kms/docs/importing-a-key
... key are used for symmetric encryption, asymmetric encryption, or asymmetric signing. ... In the Key name field, enter the name for your key. For Protection ...

Cloud HSM | Cloud KMS | Google Cloud

https://cloud.google.com/kms/docs/hsm
In the Key name field, enter the name for your key. Click the Protection level dropdown and select HSM. Click the Purpose dropdown and select Symmetric encrypt/ ...

Encrypting and decrypting data with a symmetric key | Cloud KMS ...

https://cloud.google.com/kms/docs/encrypt-decrypt
Replace the following: KEY_NAME : the name of the key that you want to use for encryption. KEY_RING : the name ...

US10862683B2 - Implicit RSA certificates - Google Patents

https://patents.google.com/patent/US10862683B2/en
... name, user public key and other information. The signature along with the user name and public key is sent to MITM over secure session 451, although SSH ...

US7743069B2 - Database system providing SQL extensions for ...

https://patents.google.com/patent/US7743069B2/en
... other encryption algorithms may be used in place of AES and RSA. The ... symmetric key and keypairname is the name of an existing asymmetric key pair.

Package google.cloud.kms.v1

https://cloud.google.com/kms/docs/reference/rpc/google.cloud.kms.v1
purpose MAC, producing a tag that can be verified by another source with the same key. ... The name of the CryptoKeyVersion public key. Provided here for ...

US5724425A - Method and apparatus for enhancing software ...

https://patents.google.com/patent/US5724425A/en
It is this possibility that gave the field its name: public-key cryptography. ... Within a short time yet another public-key system was to appear, this due to ...

US7382883B2 - Deriving a symmetric key from an asymmetric key ...

https://patents.google.com/patent/US7382883B2/en
Each word automatically includes plurals and close synonyms. Adjacent words ... encryption key (FEK) (which is another symmetric key). The FEK is then ...

Encrypt disks with customer-supplied encryption keys | Compute ...

https://cloud.google.com/compute/docs/disks/customer-supplied-encryption
... name": "snapshot-encrypted-disk" } ... The following example converts an encrypted and RSA-wrapped persistent disk to an image that uses the same encryption key.