- Overview
- Tutorials
- How Tos
- Download
- Install
- Configure
- Secure
- TLS API Configuration
- Configure API Authentication and Authorization with JWT
- Configure API Limits
- Set Resource Limits
- Crypto key management
- Restrict key usage
- Namespace Key Management
- Key management service (KMS) configuration
- Optimize
- Observe
- Operate
- Initializing node identity manually
- Canton Console
- Synchronizer connections
- High Availability Usage
- Manage Daml packages and archives
- Participant Node pruning
- Party Management
- Party Replication
- Decentralized party overview
- Setup an External Party
- Ledger API User Management
- Node Traffic Management
- Identity Management
- Upgrade
- Decommission
- Recover
- Troubleshoot
- Explanations
- Reference
Note
This page is a work in progress. It may contain incomplete or incorrect information.
Supported Cryptographic Schemes¶
Within Canton we use the cryptographic primitives of signing, symmetric and asymmetric encryption, and MAC with the following supported schemes:
Crypto Provider |
Tink |
JCE |
KMS |
---|---|---|---|
Signing |
|||
Ed25519 [ed-25519] |
D |
D |
P |
ECDSA P-256 [ec-dsa-p-256] |
S |
S |
D |
ECDSA P-384 [ec-dsa-p-384] |
S |
S |
S |
Symmetric Encryption |
|||
AES128-GCM [aes-128-gcm] |
D |
D |
D |
Asymmetric Encryption |
|||
ECIES on P-256 with HMAC-SHA256 and AES128-GCM [ecies-p-256-hkdf-hmac-sha-256-aes-128-gcm] |
D |
D |
P |
ECIES on P-256 with HMAC-SHA256 and AES128-CBC [ecies-p-256-hkdf-hmac-sha-256-aes-128-cbc] |
/ |
S |
P |
RSA 2048 with OAEP and SHA-256 [rsa-2048-oaep-sha-256] |
/ |
S |
D |
MAC |
|||
HMAC with SHA-256 [hmac-sha-256] |
D |
D |
D |
Provider |
SIGNING |
ENCRYPTION |
---|---|---|
AWS |
|
|
GCP |
|
|
Driver |
|
|