Key States
Each key has its state that determines which operations can be performed using that key. Before performing any crypto operations, the state transitions need to be considered. A key can have following states throughout its lifecycle:
Key States | Behavior |
---|---|
Pre-Active | The key is not usable, exportable. No cryptographic operations are allowed. |
Active | The key can be used in protect and reveal operations. |
Compromised | The key can't be used to protect data. Only reveal operation is allowed. |
Deactivated | The key can't be used to protect and reveal data. |
Destroyed | The key bytes are no longer available for use. |