logo

Database

Summary

The system must use asymmetric cryptography with separated keys for encryption and signatures.

Description

The key used for encryption is responsible for ensuring the confidentiality of data. By keeping the encryption key separate from the key used for signatures, the system ensures that compromising one type of operation (decryption) does not automatically compromise the other (signature verification). Additionally, separating keys simplifies key management. Each key pair has a specific purpose, and their roles are clearly defined.

Supported In

This requirement is verified in following services

Essential Plan

Yes

Advanced Plan

Yes