Skip to main content

Key-Attributes

AttributeDescription
EncryptThe key can be used for encryption, meaning it can transform plaintext into ciphertext.
DecryptThe key can be used for decryption, allowing it to transform ciphertext back into plaintext.
SignThe key can be used for creating digital signatures.
VerifyThe key can be used for verifying digital signatures.
WrapThe key can be used to wrap (encrypt) other keys for secure transmission or storage.
UnwrapThe key can be used to unwrap (decrypt) encrypted keys.
DeriveThe key can be used to derive other keys.
BIP32The key can be used for hierarchical deterministic key derivation (BIP32).
SLIP10The key can be used for hierarchical deterministic key derivation (SLIP10).
ExtractableThe key can be extracted from the device or context where it's stored.
ModifiableThe key can be modified once it's generated. The attributes can only get harder, not weaker (e.g. sensitive was false, can be set to true but not vice-verca). The 'modifiable' attribute applies exclusively to the key attribute and not to SKA-Policy.
DestroyableThe key can be intentionally destroyed (deleted).
SensitiveThe key contains sensitive information and is treated as confidential.
CopyableThe key can be copied or duplicated.