About 1,770,942 results (2,545 milliseconds)

Create a key | Cloud KMS | Google Cloud

https://cloud.google.com/kms/docs/create-key
Jan 1, 2023 ... Create a symmetric encryption key · In the Google Cloud console, go to the Key Management page. · Click the name of the key ring for which you ...

Odd Error Message w/SAPIC+, state storage, and symmetric ...

https://groups.google.com/g/tamarin-prover/c/Qww9SsprBHM
Feb 14, 2025 ... ... other communicating parties. I also use the Tamarin `symmetric-encryption` built-in to get `senc` and `sdec` functions and the relationship ...

What is encryption and how does it work? | Google Cloud

https://cloud.google.com/learn/what-is-encryption
Asymmetric encryption, also known as public-key cryptography, uses two separate keys to encrypt and decrypt data. One is a public key shared among all parties ...

Encrypting and decrypting data with a symmetric key | Cloud KMS ...

https://cloud.google.com/kms/docs/encrypt-decrypt
Replace the following: KEY_NAME : the name of the key that you want to use for encryption. KEY_RING : the name ...

Cloud KMS resources | Google Cloud

https://cloud.google.com/kms/docs/resource-hierarchy
Symmetric encryption keys have a primary key version, which is the key ... A key ring's name does not need to be unique across a Google Cloud project, but ...

Diffie-Hellman with Symmetric Encryption Execution Problem

https://groups.google.com/g/tamarin-prover/c/JRWXOauCn6E
May 11, 2024 ... Both messages symmetrically encrypted with DH established keys. The responder has a long-term DH key initialized in rule Resp_1 rule, and ...

Key purposes and algorithms | Cloud KMS | Google Cloud

https://cloud.google.com/kms/docs/algorithms
In Cloud KMS, the digest function to be used with MGF1 is specified as part of the key algorithm name. ... Limited to symmetric encryption and asymmetric signing.

Raw symmetric encryption | Cloud KMS | Google Cloud

https://cloud.google.com/kms/docs/raw-encryption
You might also be able to get the required permissions through custom roles or other predefined roles. ... KEY_NAME : the name of the key to use for encryption.

Default encryption at rest | Security | Google Cloud

https://cloud.google.com/docs/security/encryption/default-encryption
This keystore master key is AES-256 and is itself stored in another key management service, called Root Keystore. ... Symmetric encryption, AES-GCM (256 bits).

CA2496664C - Encrypting operating system - Google Patents

https://patents.google.com/patent/CA2496664C/en
Similarly, the file name is encrypted with a symmetric encryption operation ... encrypted name of one encrypted file cannot be distinguished from another ...

Cloud HSM | Cloud KMS | Google Cloud

https://cloud.google.com/kms/docs/hsm
In the Key name field, enter the name for your key. Click the Protection level dropdown and select HSM. Click the Purpose dropdown and select Symmetric encrypt/ ...

Customer-managed encryption keys (CMEK) | Cloud KMS | Google ...

https://cloud.google.com/kms/docs/cmek
Your symmetric keys are used to encrypt and decrypt in the envelope encryption model. ... CMEK-protected resources have a metadata field that holds the name of ...

Decrypt with a symmetric key | Cloud KMS | Google Cloud

https://cloud.google.com/kms/docs/samples/kms-decrypt-symmetric
create()) { // Build the key version name from the project, location, key ring, and // key. ... To search and filter code samples for other Google Cloud products, ...

Import a key version into Cloud KMS | Google Cloud

https://cloud.google.com/kms/docs/importing-a-key
... key are used for symmetric encryption, asymmetric encryption, or asymmetric signing. ... In the Key name field, enter the name for your key. For Protection ...

Asymmetric encryption | Cloud KMS | Google Cloud

https://cloud.google.com/kms/docs/asymmetric-encryption
... asymmetric cryptography, also known as public key cryptography. Symmetric encryption, on the other hand, uses the same key to encrypt and decrypt data.

US7382883B2 - Deriving a symmetric key from an asymmetric key ...

https://patents.google.com/patent/US7382883B2/en
Each word automatically includes plurals and close synonyms. Adjacent words ... encryption key (FEK) (which is another symmetric key). The FEK is then ...

Google's Threat model for Post-Quantum Cryptography - Google ...

https://bughunters.google.com/blog/5108747984306176/google-s-threat-model-for-post-quantum-cryptography
Mar 11, 2024 ... ... term quantum computers. (See "Reassessing ... Another one of the more important asymmetric encryption protocols is key import for HSMs.

US7743069B2 - Database system providing SQL extensions for ...

https://patents.google.com/patent/US7743069B2/en
... other encryption algorithms may be used in place of AES and RSA. The ... symmetric key and keypairname is the name of an existing asymmetric key pair.

Algorithm mismatch w/ trunk and Shib IdP

https://groups.google.com/g/simplesamlphp/c/TQb29CDlBJg
public key encryption while the other side uses symmetric key, ...) It looks ... Name="urn:oid:1.3.6.1.4.1.5923.1.1.1.6" NameFormat="urn:oasis:names:tc ...

[Pqc-forum] Key Establishment for PQC algorithms

https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/oc3Xl0ZKLGI/m/m_23qpdtBgAJ
... term "key ... as myself anyway; using public key encryption for something other than to encrypt secret key material for symmetric encryption and/or