Module ate::crypto [−][src]
Structs
EncryptResult | |
EncryptedPrivateKey | |
Hash | Represents a hash of a piece of data that is cryptographically secure enough that it can be used for integrity but small enough that it does not bloat the redo log metadata. |
InitializationVector | Represents an initiailization vector used for both hash prefixing to create entropy and help prevent rainbow table attacks. These vectors are also used as the exchange medium during a key exchange so that two parties can established a shared secret key |
Enums
EncryptKey | Represents an encryption key that will give confidentiality to
data stored within the redo-log. Note this does not give integrity
which comes from the |
KeySize | Size of a cryptographic key, smaller keys are still very secure but have less room in the future should new attacks be found against the crypto algorithms used by ATE. |
PrivateEncryptKey | Private encryption keys provide the ability to decrypt a secret that was encrypted using a Public Key - this capability is useful for key-exchange and trust validation in the crypto chain. Asymetric crypto in ATE uses the leading candidates from NIST that provide protection against quantom computer attacks |
PrivateSignKey | Private keys provide the ability to sign records within the redo log chain-of-trust, these inserts records with associated public keys embedded within teh cahin allow records/events stored within the ATE redo log to have integrity without actually being able to read the records themselves. This attribute allows a chain-of-trust to be built without access to the data held within of chain. Asymetric crypto in ATE uses the leading candidates from NIST that provide protection against quantom computer attacks |
PublicEncryptKey | Public encryption keys provide the ability to encrypt a secret without the ability to decrypt it yourself - this capability is useful for key-exchange and trust validation in the crypto chain. Asymetric crypto in ATE uses the leading candidates from NIST that provide protection against quantom computer attacks |
PublicSignKey | Public key which is one side of a private key. Public keys allow records/events stored within the ATE redo log to have integrity without actually being able to read the records themselves. This attribute allows a chain-of-trust to be built without access to the data held within of chain. Asymetric crypto in ATE uses the leading candidates from NIST that provide protection against quantom computer attacks |