The system must use asymmetric cryptography with separated keys for encryption and signatures.
The key used for encryption is responsible for ensuring the confidentiality of data. By keeping the encryption key separate from the key used for signatures, the system ensures that compromising one type of operation (decryption) does not automatically compromise the other (signature verification).
Additionally, separating keys simplifies key management. Each key pair has a specific purpose, and their roles are clearly defined.
This requirement is verified in following services
Plan | Supported |
---|---|
Essential | 🟢 |
Advanced | 🟢 |