About 1,085,867 results (3,148 milliseconds)

What is encryption and how does it work? | Google Cloud

https://cloud.google.com/learn/what-is-encryption
Types of encryption. The two most common types of encryption algorithms are symmetric and asymmetric. Symmetric encryption, also known as a shared key or ...

Cloud KMS resources | Google Cloud

https://cloud.google.com/kms/docs/resource-hierarchy
In symmetric encryption or signing, the same key is used to encrypt and decrypt data or to sign and verify a signature. In asymmetric encryption or signing, the ...

Key rotation | Cloud KMS | Google Cloud

https://cloud.google.com/kms/docs/key-rotation
Cloud Key Management Service does not support automatic rotation of asymmetric ... For example, the recommended key lifetime for symmetric encryption keys in ...

Cloud Key Management Service encryption | Security | Google Cloud

https://cloud.google.com/docs/security/key-management-deep-dive
... in Cloud KMS. The Cloud KMS software backend gives you the flexibility to encrypt or sign your data with either a symmetric or asymmetric key that you control.

Understand Key Concepts in Tink | Google for Developers

https://developers.google.com/tink/key-concepts
Nov 14, 2024 ... A primitive defines the details of a cryptographic algorithm and the key ... of symmetric encryption with the convenience of public-key encryption ...

Google's Threat model for Post-Quantum Cryptography - Google ...

https://bughunters.google.com/blog/5108747984306176/google-s-threat-model-for-post-quantum-cryptography
Mar 11, 2024 ... ... of mathematical assumptions and allowing different trade-offs between public key size and ciphertext/signature size. Note that any such ...

Key version states | Cloud KMS | Google Cloud

https://cloud.google.com/kms/docs/key-states
The impact of key version state on cryptographic operations depends on whether the key is used for: Symmetric encryption; Asymmetric encryption or digital ...

Import a key version into Cloud KMS | Google Cloud

https://cloud.google.com/kms/docs/importing-a-key
... key are used for symmetric encryption, asymmetric encryption, or asymmetric signing. ... Note: The import method is different from the algorithm of the key to be ...

Distributed - 12 - Advanced Concepts

https://docs.google.com/document/d/1BE97ZjyE0teD665Ac4XVRFyC7SCe3AFadOYXyaUgp7o/edit?usp=sharing
The Data Encryption Standard (DES) is an outdated symmetric-key method of data encryption. ... Symmetric-vs-Asymmetric-Encryption. Because both symmetric ...

Glossary | Tink | Google for Developers

https://developers.google.com/tink/glossary
Nov 14, 2024 ... A primitive defines the details of a cryptographic algorithm and the key ... of symmetric encryption with the convenience of public-key encryption ...

Cloud Key Management | Google Cloud

https://cloud.google.com/security/products/security-key-management
A cloud-hosted key management service that lets you manage symmetric and asymmetric cryptographic keys for your cloud services the same way you do on-premises.

Cloud Key Management Service overview | Cloud KMS | Google ...

https://cloud.google.com/kms/docs/key-management-service
Supports symmetric and asymmetric keys for encryption and decryption. Automatically rotates symmetric keys. Supports several common algorithms. FIPS 140-2 Level ...

Untitled

https://groups.google.com/group/acro_it_2012/attach/bc72e92711db54d0/IS.xlsx?part=0.1
What is the fundamental difference between symmetric and asymmetric encryption? ... What are the main feature of RSA algorithms? If p = 7 and Q=17, then ...

Key import | Cloud KMS | Google Cloud

https://cloud.google.com/kms/docs/key-import
Asymmetric keys must use one of the length and algorithm combinations supported by Cloud KMS. Important: An RSA key's public exponent must be 65,537 or higher.

Round 2 Embedded Energy Results and general Comments

https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/UH-8hkFODac/m/ydY1y_5-AAAJ
This process evaluates public-key cryptography algorithms only (although they have a set of symmetric components such as SHAKE inside them). Public-key ...

Get started with Cloud KMS | T-Systems Sovereign Cloud | Google ...

https://cloud.google.com/t-systems-sovereign-cloud/docs/getting-started-kms
Creating an asymmetric signing key is similar to creating a symmetric encryption key. The primary differences are the key's purpose and default algorithm.

I want to exchange data | Tink | Google for Developers

https://developers.google.com/tink/exchange-data
... of symmetric encryption with the convenience of public key (asymmetric) cryptography. ... encryption with associated data (AEAD) algorithm.

WO2016191176A1 - Cryptographic unit for public key infrastructure ...

https://patents.google.com/patent/WO2016191176A1/ko
Other examples of symmetric ciphering algorithms 141b may ... the public key 172 in a certificate 122a could use a different asymmetric ciphering algorithm ...

US10348704B2 - Method for a dynamic perpetual encryption ...

https://patents.google.com/patent/US10348704B2/
The invention of asymmetric encryption (using different but related keys to encrypt ... of stream cipher base on selector of encryption operation and key ...

Rotate a key | Cloud KMS | Google Cloud

https://cloud.google.com/kms/docs/rotate-key
This page shows how to automatically or manually rotate a key. For more information about key rotation in general, see Key rotation.