Module ate::crypto[][src]

Structs

EncryptResult
EncryptedPrivateKey
Hash

Represents a hash of a piece of data that is cryptographically secure enough that it can be used for integrity but small enough that it does not bloat the redo log metadata.

InitializationVector

Represents an initiailization vector used for both hash prefixing to create entropy and help prevent rainbow table attacks. These vectors are also used as the exchange medium during a key exchange so that two parties can established a shared secret key

Enums

EncryptKey

Represents an encryption key that will give confidentiality to data stored within the redo-log. Note this does not give integrity which comes from the PrivateKey crypto instead.

KeySize

Size of a cryptographic key, smaller keys are still very secure but have less room in the future should new attacks be found against the crypto algorithms used by ATE.

PrivateEncryptKey

Private encryption keys provide the ability to decrypt a secret that was encrypted using a Public Key - this capability is useful for key-exchange and trust validation in the crypto chain. Asymetric crypto in ATE uses the leading candidates from NIST that provide protection against quantom computer attacks

PrivateSignKey

Private keys provide the ability to sign records within the redo log chain-of-trust, these inserts records with associated public keys embedded within teh cahin allow records/events stored within the ATE redo log to have integrity without actually being able to read the records themselves. This attribute allows a chain-of-trust to be built without access to the data held within of chain. Asymetric crypto in ATE uses the leading candidates from NIST that provide protection against quantom computer attacks

PublicEncryptKey

Public encryption keys provide the ability to encrypt a secret without the ability to decrypt it yourself - this capability is useful for key-exchange and trust validation in the crypto chain. Asymetric crypto in ATE uses the leading candidates from NIST that provide protection against quantom computer attacks

PublicSignKey

Public key which is one side of a private key. Public keys allow records/events stored within the ATE redo log to have integrity without actually being able to read the records themselves. This attribute allows a chain-of-trust to be built without access to the data held within of chain. Asymetric crypto in ATE uses the leading candidates from NIST that provide protection against quantom computer attacks