Advertisement

Key Storage and Azure Key Vault

  • Stephen Haunts
Chapter

Abstract

In previous chapters, we built a sophisticated encryption example that had the ability to use symmetric encryption to encrypt our data while protecting the symmetric encryption keys utilizing an RSA public and private key pair. While symmetric encryption is fast and efficient, moving the keys between multiple parties is very hard to achieve safely; this is why we use RSA to encrypt the symmetric key. The key is encrypted using the recipient’s public key (which can be known by anyone) and is then decrypted using the recipients private key (which only they know).

Copyright information

© Stephen Haunts 2019

Authors and Affiliations

  • Stephen Haunts
    • 1
  1. 1.BelperUK

Personalised recommendations