The following cryptographic operations are provided by Fortanix Data Security Manager:
- Generation of symmetric (AES, DES, 3DES, HMAC) and asymmetric (RSA, EC) keys
- Encryption and decryption using symmetric and asymmetric keys
- Sign and verify operations
- MAC-generate and MAC-verify operations
- Key derivation using symmetric encryption
A complete list of supported algorithms is available at https://support.fortanix.com/hc/en-us/articles/360016160411-Algorithm-Support.
Comments
Please sign in to leave a comment.