Keys-Related Terminology

A definition of terminologies related to the keys.

The following table provides an introduction to terminology related to keys that can help you understand Protegrity Key Management.

TermDefinition
Master Key (MK)It is generated and stored in the Key Store. When the Key Management is initialized, the Key Store is switched or active key is rotated. MK protects all DEKs in the Policy repository.
Repository Key (RK)It is generated in the configured Key Store when the Key Management is initialized or active key is rotated. It is protected by MK. It protects the Policy Repository in ESA.
Data Store Keys (DSK)It is generated in the configured Key Store when a Data Store is created. It is protected by MK. It is only used to protect staging located on the ESA.
Signing KeyIt is generated in the configured Key Store when the ESA is installed and key management is initialized. It is protected by MK.
It is used to sign the audits generated by protectors. It is used by the Protector to add a signature to the log records generated for each data protection operation, which are then sent from the Protector to the ESA.
The Signing Key helps to identify that the log records have not been tampered with and are received from the required protection endpoint or Protector.
Key Encryption Keys (KEK)It protects other keys. In Protegrity Data Security Platform, the MK is the KEK.
Data Encryption Keys (DEK)It is used to protect data. In the Protegrity Data Security Platform, the RK, Signing Key, DSK, and Data Element Keys are the DEKs.
Data Element KeysIt is generated when a data element is created. This key protects the sensitive data.
Protegrity Soft HSMIt is internally housed in the ESA. It is used to generate keys and stores the Master key.
Key Store - HSM or KMSThe Key Store can be a Hardware Security Module (HSM), or other supported Key Management Service (KMS) that can store keys and perform cryptographic operations.
NIST 800-57NIST Special Publication 800-57 defines best practices and recommendations for the Key Management.
FIPS 140-2Federal information process standard (FIPS) used to accredit cryptographic modules.
PKCS#11 InterfaceStandard API for Key Management.
Key StatesThe state of a key during the key life cycle.
CryptoperiodsThe time span during which a specific key is authorized for use or in which the keys for a given system or application may remain in effect.
Originator Usage Period (OUP)The period of time in the cryptoperiod of a symmetric key during which cryptographic protection may be applied to data
Recipient Usage Period (RUP)The period of time during the cryptoperiod of a symmetric key during which the protected information is processed.
EndpointIt is the protection endpoint. In most cases, it is the Protector.
Policy RepositoryInternal storage in ESA, which stores policy information including the Master key properties and all DEK properties.
Last modified February 7, 2025