Subtle Crypto
The Subtle Crypto Interface provides an advanced way to manage cryptographic operations such as encryption, decryption, signing, signature verifications, key wrapping/unwrapping, key import/export, etc. The Key lifecycle management should be done by the developers. The Subtle Crypto interface offers more algoritm and cryptographic mode as well as configuration.
Using Subtle Crypto APIs from Applications
Generating Keys
Class | Operation | Parameters: type | Returns | Behavior |
---|---|---|---|---|
Crypto.Subtle | generateKey | algorithm: T, extractable: boolean, usages: string[] | Result<CryptoKey, Error> | Generate a CryptoKey based on the algorithm object and usages provided. Return a ResultSet Result<CryptoKey, Error> containing either the generated CryptoKey or an Error . |
A CryptoKey
contains the key type and usages and is an handle on the key.
Generating RSA Key
For generating RSA key, the algorithm object to use is Crypto.RsaHashedKeyGenParams
.
When generating an RSA Key, only the private key is generated and not a key pair. Usages needs to be align with that, for instance an RSA private key can only be used for signing, decrypting or unwraping.
Public key derivation can be done directly from the private key and will automatically get the usages aligned with the private one.
Class | Operation | Parameters: type | Returns | Behavior |
---|---|---|---|---|
Crypto.Subtle | getPublicKey | key: CryptoKey | Result<CryptoKey, Error> | Derive the public CryptoKey corresponding to the private key provided. Return a ResultSet Result<CryptoKey, Error> containing either the generated CryptoKey or an Error . |
Generating EC Key
For generating EC key, the algorithm object to use is Crypto.EcKeyGenParams
.
When generating an EC Key, only the private key is generated and not a key pair. Usages needs to be align with that, for instance an EC private key can only be used for signing or for derivation.
Public key derivation can be done directly from the private key and will automatically get the usages aligned with the private one.
Class | Operation | Parameters: type | Returns | Behavior |
---|---|---|---|---|
Crypto.Subtle | getPublicKey | key: CryptoKey | Result<CryptoKey, Error> | Derive the public CryptoKey corresponding to the private key provided. Return a ResultSet Result<CryptoKey, Error> containing either the generated CryptoKey or an Error . |
Generating AES Key
For generating AES key, the algorithm object to use is Crypto.AesKeyGenParams
.
Data encryption and decryption
Class | Operation | Parameters: type | Returns | Behavior |
---|---|---|---|---|
Crypto.Subtle | encrypt | algorithm: T, key: CryptoKey, clearText: ArrayBuffer | Result<ArrayBuffer, Error> | Encrypt the clearText with the algorithm object and key provided. Return an ArrayBuffer containing the cipherText or an Error . |
Crypto.Subtle | decrypt | algorithm: T, key: CryptoKey, cipherText: ArrayBuffer | Result<ArrayBuffer, Error> | Decrypt the cipherText with the algorithm object and key provided. Return an ArrayBuffer containing the clearText or an Error . |
AES-GCM
For encrypting with AES-GCM you need an AES key and to use the Crypto.AesGcmParams
algorithm object.
RSA-OAEP
For encrypting with RSA-OAEP you need an RSA key and to use the Crypto.RsaOaepParams
algorithm object.
Signing and Verifying
Class | Operation | Parameters: type | Returns | Behavior |
---|---|---|---|---|
Crypto.Subtle | sign | algorithm: T, key: CryptoKey, data: ArrayBuffer | Result<ArrayBuffer, Error> | Sign the data with the algorithm object and key provided. Return an ArrayBuffer containing the signature or an Error . |
Crypto.Subtle | verify | algorithm: T, key: CryptoKey, data: ArrayBuffer, signature: ArrayBuffer | Result<Crypto.SignatureVerification, Error> | Verify the signature against the data with the algorithm object and key provided. Return an Crypto.SignatureVerification containing a boolean or an Error . |
ECDSA
For ECDSA signature you need an EC key pair and to use the Crypto.EcdsaParams
algorithm object.
RSA-PSS
For RSA-PSS signature you need an RSA key pair and to use the Crypto.RsaPssParams
algorithm object.
Key wrapping
Class | Operation | Parameters: type | Returns | Behavior |
---|---|---|---|---|
Crypto.Subtle | wrapKey | format: string, key: CryptoKey, wrappingKey: CryptoKey, wrapAlgo: T | Result<ArrayBuffer, Error> | Wrap the key in the format specified with the wrappingKey using the wrapping algorithm . Return an ArrayBuffer containing the wrapped key or an Error . |
Crypto.Subtle | unwrapKey | format: string, wrappedKey: ArrayBuffer, unwrappingKey: CryptoKey, unwrapAlgo: T, unwrappedKeyAlgo: E, extractable: boolean, usages: string[] | Result<CryptoKey, Error> | Unwrap the wrappedKey wrapped in the format with the unwrappingKey and unwrapAlgo and create a Cryptokey with the specified unwrappedKeyAlgo and parameters. Return a result set containing a Crypto.CryptoKey or an Error . |
Format that can be used depending on the key you want to wrap/unwrap are the following: raw
, spki
, pkcs8
, pkcs1
, sec1
.
AES-KW
To wrap and unwrap key with AES-KW you will need an AES key, a key to wrap and to use NamedAlgorithm
.
AES-GCM
To wrap and unwrap key with AES-GCM you will need an AES key, a key to wrap and to use Crypto.AesGcmParams
algorithm object.
RSA-OAEP
To wrap and unwrap key with RSA-OAEP you will need an RSA key, a key to wrap and to use Crypto.RsaOaepParams
algorithm object.
Importing and Exporting key
Class | Operation | Parameters: type | Returns | Behavior |
---|---|---|---|---|
Crypto.Subtle | importKey | format: string, keyData: ArrayBuffer, algorithm: T, extractable: boolean, usages: string[] | Result<CryptoKey, Error> | Import a key from the keyData in the format specified. Return a result set containing the CryptoKey or an Error . |
Crypto.Subtle | exportKey | format: string, key: CryptoKey | Result<ArrayBuffer, Error> | Export the key in the specified format . Return a result set containing a ArrayBuffer of the exported key or an Error . |
Depending on the type of Key to export or import the format to use are the following: raw
, spki
, pkcs8
, pkcs1
, sec1
.
If the key is not extractable
then export will fail.
Making data digest
The interface can be accessed through the Crypto.SHA
keyword and is compatible with SHA2 and SHA3 digest.
Class | Operation | Parameters: type | Returns | Behavior |
---|---|---|---|---|
Crypto.Subtle | digest | algorithm: string, data: ArrayBuffer | Result<ArrayBuffer, Error> | Generate a digest of the data based on the algorithm specified. Return a ResultSet Result<ArrayBuffer, Error> containing either the digest in an ArrayBuffer or an Error . |