Data Encryption¶
Excalibur employs industry-standard cryptography for data protection.
Encryption Standards¶
Excalibur uses Public Key Infrastructure (PKI) based on ECIES (Elliptic Curve Integrated Encryption Scheme) for asymmetric key ciphers. For details, see Nakov's CryptoBook on ECIES.
Key Storage (HSM)¶
For cloud services, Excalibur utilizes Hardware Security Modules (HSMs) to store cryptographic keys securely. HSMs ensure that key material is stored in dedicated hardware, similar to secure enclaves on mobile phones, but on a larger, often network-attached scale.
Customer-Provided Keys¶
For larger customers who have their own HSMs, Excalibur can integrate with these, as they typically provide APIs for interaction. This allows customers to maintain control over their key material.