WrappingScheme
Represents different methods for securely wrapping (encrypting) cryptographic keys. Key wrapping is a crucial operation in cryptography, used to securely transmit or store sensitive key material.
Extends
BaseCryptoClass
Properties
AES_KEY_WRAP
readonly
static
AES_KEY_WRAP:"AesKeyWrapScheme"
="AesKeyWrapScheme"
Constant representing the AES Key Wrap scheme.
This scheme uses the AES algorithm to wrap and unwrap keys directly. The key material is encrypted using an AES key, providing confidentiality and integrity for the wrapped key.
ECDH_AES_KEY_WRAP
readonly
static
ECDH_AES_KEY_WRAP:"EcdhAesKeyWrapScheme"
="EcdhAesKeyWrapScheme"
Constant representing the ECDH AES Key Wrap scheme.
This scheme utilizes Elliptic Curve Diffie-Hellman (ECDH) for key exchange, combined with AES for key wrapping. The wrapping process for this scheme:
- An ECDH key pair is used to derive a shared secret, which is then used as an AES key;
- Use the AES key to wrap the key material. This method ensures that both parties involved in the key exchange can securely communicate and unwrap the key material using the derived AES key.
RSA_AES_KEY_WRAP
readonly
static
RSA_AES_KEY_WRAP:"RsaAesKeyWrapScheme"
="RsaAesKeyWrapScheme"
Constant representing the RSA AES Key Wrap scheme.
This scheme combines the RSA and AES algorithms to securely wrap and unwrap keys. The wrapping process involves:
- Generating a temporary AES key;
- Encrypting it with the RSA public key;
- Using this AES key to encrypt the key material. The final wrapped key consists of both the RSA-encrypted AES key and the AES-encrypted key material. This ensures that only the holder of the corresponding RSA private key can decrypt and retrieve the AES key, and subsequently, the key material.
Accessors
name
Get Signature
get name():
string
Get the name of the wrapping scheme.
Returns
string
The name of the wrapping scheme.
Last updated: Sep 30, 2025