Managing Encryption Keys
Encryption keys are one of the most critical elements that enable the security guarantees of CyborgDB. By default, one key is used for the entire index, and it is used to generate and secure other encryption keys, including:
- Encrypted index tokens
- Index centroid salted hashes
- Index payload (embedding) encryption
- Item content encryptions
- Encrypted query tokens
This main key, known in the code as the index_key
, is a 256-bit symmetric cryptographic key—the same you would find when using AES-256 encryption. CyborgDB’s cryptography is based entirely on well-established cryptographic standards, including AES, HMAC, and SHA-3 (Keccak).
Without the correct index_key
, it is impossible to use a CyborgDB Encrypted Index. You cannot upsert vectors, query the index, or even delete it. Hence, it is critical to manage these encryption keys safely.
Generating Key Locally (for Development)
For local development and evaluation, you can generate a 256-bit encryption key locally and use it in your calls to CyborgDB. Here’s how you can do this using OpenSSL and integrate it with CyborgDB in Python.
Generate a Key with OpenSSL
Run the following command to generate a 256-bit encryption key, encoded in Base64:
This saves the key to a file named index_key.txt
. Ensure that this file is kept secure and not included in your source control.
Use the Key in Python
You can either load the key directly from the file and use it directly with CyborgDB.
Again, this should only be used for development and evaluation purposes; do not store encryption keys locally for production use.
Using Key Management Services (for Production)
For production environments, a Key Management Service (KMS) or Hardware Security Module (HSM) is strongly recommended to securely store and manage encryption keys. This ensures the highest level of security by isolating the keys from application logic and providing robust access controls.
Overview of KMS
A KMS is a managed service that provides centralized control over encryption keys, including:
- Key Generation: Automatically generating keys with required levels of entropy.
- Secure Storage: Storing keys in a tamper-proof environment.
- Access Control: Enforcing strict role-based access control (RBAC) policies.
- Auditing: Logging key usage for compliance and monitoring.
Supported KMS Providers
CyborgDB can integrate with popular KMS providers, such as:
- AWS Key Management Service (AWS KMS)
- Google Cloud Key Management (Google Cloud KMS)
- Azure Key Vault
- HashiCorp Vault
Step-by-Step Example: AWS KMS
Generate a Data Key Using AWS KMS
Option A: Command Line
Use the AWS CLI to generate a data key:
- Replace
<Your-Key-Id>
with your KMS Key ID or ARN. - The command outputs a JSON object containing both the plaintext key and the encrypted key.
Example Output:
Note: The Plaintext
and CiphertextBlob
are Base64-encoded binary data.
Option B: Python
Store the Encrypted Key
- Encrypted Key: Since it’s encrypted, you can safely store it in your application’s configuration file, environment variable, or secure parameter store.
Example of storing the encrypted key in Base64-encoded format:
Use the Encrypted Key in Your Application at Runtime
In your application code, decrypt the encrypted key at runtime using AWS KMS:
Explanation:
- Encrypted Key Storage: The encrypted key (
encrypted_key_b64
) is safe to store in configuration files since it’s encrypted. - Runtime Decryption: The
kms_client.decrypt
method securely retrieves the plaintext key at runtime.
Ensure IAM Permissions
Your application needs permission to use the kms:Decrypt
action. Attach a policy to your IAM role or user:
Benefits of This Approach
- Security: The plaintext key is never stored persistently. It’s only available in memory during runtime.
- Simplicity: You can generate and manage the key using AWS KMS and standard AWS tools.
- No Need for Secure Storage: Since the encrypted key is safe to store in your application’s configuration, you don’t need additional secure storage solutions.
By generating the data key using AWS KMS and storing only the encrypted key, you can securely manage your encryption key without needing to store it securely elsewhere. Your application decrypts the encrypted key at runtime using AWS KMS, ensuring that the plaintext key is only available in memory during execution.
Was this page helpful?