Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 4 additions & 0 deletions menu/navigation.json
Original file line number Diff line number Diff line change
Expand Up @@ -510,6 +510,10 @@
"label": "Understanding Key Manager",
"slug": "understanding-key-manager"
},
{
"label": "Understanding Key Manager cryptography",
"slug": "cryptographic-details-key-manager"
},
{
"label": "Differences between Key Manager and Secret Manager",
"slug": "differences-key-and-secret-manager"
Expand Down
Original file line number Diff line number Diff line change
@@ -1,16 +1,16 @@
---
meta:
title: Cryptographic details of Scaleway Key Manager
title: Understanding Key Manager cryptography
description: This page describes the cryptographic mechanisms used by Scaleway Key Manager, in accordance with ANSSI-PA-079 recommendations.
content:
h1: Cryptographic details of Scaleway Key Manager
h1: Understanding Key Manager cryptography
paragraph: This page describes the cryptographic mechanisms used by Scaleway Key Manager, in accordance with ANSSI-PA-079 recommendations.
tags: key-manager security
categories:
- identity-and-access-management
dates:
validation: 2025-05-12
posted: 2025-05-12
validation: 2025-05-23
posted: 2025-05-23
---

## Cryptographic primitives in Scaleway Key Manager
Expand All @@ -25,7 +25,7 @@ Scaleway Key Manager uses a **C**ryptographically **S**ecure **P**seudorandom **

This CSPRNG is based on the ChaCha-based pseudorandom number generator provided by modern Linux kernels. It is seeded with high-entropy, unpredictable sources, such as:

- Timing variations from hardware events
- Timing variations from hardware events
- True Random Number Generators (TRNGs), including the `RDSEED` and `RDRAND` instructions available on AMD64 processors

<Message type="note">
Expand Down Expand Up @@ -57,8 +57,7 @@ To reduce the risk of key overuse, plaintext payloads are limited to a maximum s
While Key Manager internally uses AES-256-GCM, this does not restrict users to the same algorithm for their data encryption keys (DEKs).
We recommend using cryptographic libraries like Tink, which handle DEK management with robust and reviewed algorithms.
Scaleway provides Tink integrations for Go and Python, which is the preferred integration method.

- [Tink Python integration](https://github.com/scaleway/tink-py-scwkms)
- [Ting Go integration](https://github.com/scaleway/tink-go-scwkms)

</Message>
Loading