Key Rotation & Revocation
Overview
Anka Secure follows a crypto-agile approach to key management, ensuring that cryptographic keys can be rotated and revoked securely. The system is designed to minimize security risks while maintaining continuity for cryptographic operations.
Key lifecycle management in Anka Secure includes:
- Key Revocation: Marking a key as revoked, preventing further use.
- Key Rotation (Planned): Automatically generating a new key (
nextKid
) when a key reaches its soft expiration or usage limit.
Both mechanisms leverage the key chain model, which includes:
- previousKid: Reference to the earlier key version.
- nextKid: Reference to the newly generated key in case of rotation.
Key Revocation
Revocation ensures that a key is permanently disabled and can no longer be used for cryptographic operations. Once revoked, the key:
- Cannot be used for encryption or decryption.
- Remains stored for auditing purposes.
- Can be linked to a new key through key rotation.
Revoking a Key
To revoke a key, use the following API:
API Endpoint:
Response:
HTTP/1.1 200 OK
Note: The API follows Beautiful API principles, meaning the response body is omitted.
Example: Revoking a Key
POST /api/key-management/keys/myKyberKey1234/revoke
After revocation, the key's status changes to:
Key Rotation (Upcoming)
Key rotation ensures that cryptographic keys are regularly replaced to maintain security and compliance. Anka Secure's key model is designed for rotation, with built-in support for:
-
Soft Expiration (
softLimitExpiration
): Triggers key rotation before hard expiration. -
Usage-Based Rotation (
softUsageLimit
): Automatically rotates the key when usage limits are reached. -
Key Linking (
nextKid
,previousKid
): Maintains continuity between key versions.
Planned Key Rotation Flow
-
When a key nears its soft expiration or usage limit, a new key is generated.
-
The nextKid field is updated to reference the new key.
-
The newly generated key contains a previousKid reference to the old key.
-
Encryption operations switch to the new key while allowing decryption with both.
Example: Key Rotation Model
Before rotation:
{
"kid": "myKyberKey1234",
"status": "active",
"softLimitExpiration": "2029-12-31T23:59:59Z",
"nextKid": null
}
After rotation:
Key Rotation API (Future Implementation)
POST /api/key-management/keys/{kid}/rotate
Expected Behavior:
-
Generates a new key with the same parameters.
-
Updates the nextKid field of the previous key.
-
Links the old key using previousKid.
Summary
-
Key Revocation is fully implemented via
/api/key-management/keys/{kid}/revoke
. -
Key Rotation is designed but not yet implemented.
-
The system supports seamless key transitions using
previousKid
andnextKid
fields. -
Beautiful API principles are applied, keeping interactions minimal and intuitive.
Anka Secure's crypto-agile design ensures that key management is future-proof, scalable, and secure.