CZERTAINLY / CZERTAINLY-Software-Cryptography-Provider

CZERTAINLY - implementation of software Cryptography Provider connector
https://www.czertainly.com
MIT License
2 stars 1 forks source link

Implement Keystore software cryptographic provider #1

Closed lubomirw closed 1 year ago

lubomirw commented 1 year ago

Implement Software Keystore Cryptographic provider with the following objects and descriptions.

  1. Connector - Implement the connector and the basic Interfaces including the Health, Attributes, and Info
  2. Tokens - Implement the interfaces for the management of tokens like Create, destroy, update
  3. Keys - Implement the logic for the creation of Keys. Include the following types of Keys
    • Key Pair
    • Secret Key
  4. Implement Key Operations:
    • Sign
    • Verify
    • Destroy
    • Compromise
    • Random data generation
  5. Include the endpoints and attributes for all the above mentioned operations.

Details of the design can be found at: https://wiki.3key.company/en/3Key_Services/RA_Profiles/Architecture/Cryptographic_Provider/Overview