Class ExampleScenario14
java.lang.Object
co.ankatech.ankasecure.sdk.examples.ExampleScenario14
Scenario 14 – Key Revocation Validation (ML-KEM-768)
This scenario validates that a revoked key becomes immediately unusable for cryptographic operations on ANKASecure:
- List the tenant’s initial inventory of keys.
- Generate an
ML-KEM-768
key. - Export its public-only metadata to JSON (illustrative).
- Revoke (delete) the key.
- Attempt an encrypt operation with the revoked key — expect a failure and capture the error as proof of revocation.
All artefacts are written under temp_files/.
- Since:
- 2.1.0
- Author:
- ANKATech – Security Engineering
-
Method Summary
-
Method Details
-
main
Entry-point.
-