Skip to main content

What is a Resource Key?

The resource key is the symmetric key, also called AES-256 key, which encrypts a tiCrypt resource.

note
  • The symmetric AES-256 resource key works hand-in-hand with the asymmetric RSA-256 public key where the user's public key is used to open the resource key.
  • Resource keys are never left naked or randomly stored; they are used in the shortest amount of time possible and automatically destroyed afterward.
  • If the AES-256 resource key is lost then the tiCrypt object can never be decrypted again.

Example of resource key create a new file operation in tiCrypt:

  • When you create a new file, your 'public key' makes a "box" where the hidden 'resource key' resides.
  • Next, you automatically combine your public key with the hidden resource key from the "box" to create a new encrypted user key tagged by the ID of the resource and the ID of the user (yourself).
  • At this point, the server can view the new encrypted user key.
  • The new encrypted user key can now be decrypted only with your private key.
Create File Process

The above process takes place in 0.1 milliseconds.

note

You can only decrypt resource keys that were encrypted with your public key.

tip

Cloning a resource key is useless because it is only encrypted with your key. As an admin, you can never create new encrypted user keys.