Symmetric key in KMS
A symmetric key is a set of versions, each of which defines an algorithm and cryptographic material for data encryption or decryption operations.
A symmetric key is created along with its first version that becomes the primary one. It is used by default in key operations unless you specify a different version in the input parameters.
When rotating keys, the parameters of new versions are inherited from the key parameters.
You can change the primary version of the symmetric key at any time by specifying any previous version. For additional security of your data, rotate keys on a regular basis and only use previous versions to decrypt data. This limits the lifetime of cryptographic material.
Key parameters
A KMS symmetric key may have the following parameters:
-
ID: Unique key identifier in Yandex Cloud. It is used for working with keys via the SDK, API, and CLI.
-
Name: Non-unique key name. It can be used to work with keys in the CLI if the folder only contains a single key with this name.
-
Encryption algorithm: The algorithm to be used for encryption in new versions of the key. The following symmetric encryption algorithms are supported in GCM
mode:AES-128
: AES algorithm with 128-bit keys.AES-192
: AES algorithm with 192-bit keys.AES-256
: AES algorithm with 256-bit keys.AES-256 HSM
: AES algorithm with 256-bit keys. Encryption keys are created and cryptographic operations handled in a Hardware Security Module (HSM).
-
Rotation period: Time span between automatic key rotations.
-
Status: Current state of the key. Possible statuses:
Creating
: The key is being created.Active
: The key can be used for encryption and decryption.Inactive
: The key cannot be used.
You can change the key status from
Active
toInactive
and vice versa using the update method.
Using a symmetric key
You can use a symmetric key in data encryption and decryption operations if you have the appropriate roles assigned. You can temporarily disable operations with a key by revoking roles or changing its status to Inactive
. For more information, see Access management in Key Management Service.
Destroying a key
If you delete a key or its parent resource (folder or cloud), this destroys the cryptographic material contained in it. After that, you won't be able to decrypt the data encrypted with that key.