
Before you begin
- Labs create a Google Cloud project and resources for a fixed time
- Labs have a time limit and no pause feature. If you end the lab, you'll have to restart from the beginning.
- On the top left of your screen, click Start lab to begin
Create a symmetric key
/ 50
Create an asymmetric key
/ 50
Encryption is a critical component for protecting data in cloud environments. Security professionals use cryptography to transform information into a form that unintended readers can’t understand. Symmetric and asymmetric keys are cryptographic tools used to secure data and enable secure communication over networks. Each type of key has its own distinct differences and can be deployed for different situations.
Symmetric Keys: Symmetric key cryptography uses a single key to encrypt and decrypt data. The same key is used by both the sender and the recipient which is why it's called symmetric. Symmetric key cryptography is efficient and fast.
Asymmetric Keys: Asymmetric key cryptography (also known as public-key cryptography) uses a pair of keys: a public key and a private key. One of the keys is used to encrypt data, while the other key decrypts data. These keys are mathematically related but cannot be derived from each other. Asymmetric cryptography is known for its slow performance. This is due to the use of these two mathematically related keys which are longer than those used in symmetric encryption.
In practice, many secure communication systems use a combination of symmetric and asymmetric cryptography to achieve both efficiency and security. For example, the Hypertext Transfer Protocol Secure (HTTPS) protocol uses asymmetric cryptography for the initial handshake to establish a secure connection, and then switches to symmetric encryption for the actual data transfer.
One of the major problems with symmetric key cryptography involves key distribution. How do you ensure the secure exchange of keys without having the key be compromised or stolen? Asymmetric key cryptography solves this problem by using a public and private key pair. However, it is computationally more expensive, so it’s commonly used for initial key exchange and digital signatures, while symmetric keys are used for the bulk encryption of data.
In this lab, you’ll create both a symmetric key and an asymmetric key to address a request for more space to securely store data.
Cymbal Bank stores and processes large amounts of sensitive customer data including financial transactions and personally identifiable information (PII). The CISO, Javier, wants to protect the confidentiality, integrity, and availability of this data while it's at rest, in transit, and in use. Cymbal Bank wants to transfer a large volume of its data from its on-premises servers to the cloud. Your team lead, Chloe, has suggested using a cloud key management system to create and manage encryption keys to facilitate the secure transmission of this data. You have been tasked with creating a symmetric key and an asymmetric key to support this data transmission.
Here’s how you'll do this task: First, you’ll create a symmetric key. Then, you’ll create an asymmetric key.
Read these instructions. Labs are timed and you cannot pause them. The timer, which starts when you click Start Lab, shows how long Google Cloud resources will be made available to you.
This practical lab lets you do the activities yourself in a real cloud environment, not in a simulation or demo environment. It does so by giving you new, temporary credentials that you use to sign in and access Google Cloud for the duration of the lab.
To complete this lab, you need:
Click the Start Lab button. On the left is the Lab Details panel with the following:
Click Open Google Cloud console (or right-click and select Open Link in Incognito Window) if you are running the Chrome browser. The Sign in page opens in a new browser tab.
Tip: You can arrange the tabs in separate, side-by-side windows to easily switch between them.
If necessary, copy the Google Cloud username below and paste it into the Sign in dialog. Click Next.
You can also find the Google Cloud username in the Lab Details panel.
You can also find the Google Cloud password in the Lab Details panel.
After a few moments, the Console opens in this tab.
In this task, you’ll delve into the intricate process of crafting a symmetric key, complete with considerations for its designated region and the crucial aspect of its protection level. You'll begin by generating a symmetric key with carefully tailored parameters.
In the Google Cloud console, click the Navigation menu ().
Select Security > Key Management.
On the Key Rings tabbed page, click + Create Key Ring.
Now, specify the key details.
For Key ring name, enter demo-key-ring.
For the Location type category, select Region.
Expand the Region drop-down menu, and select
Click Create.
In the Name and protection level category, in the Key name field, enter demo-key.
The Protection level should be set to Software by default, if not, select it now.
Click Continue. The Key material category expands.
For Key material, select Generated key.
Click Continue. The Purpose and algorithm category expands.
For Purpose, select Symmetric encrypt/decrypt.
Click Continue. The Versions category expands.
For Key rotation period, select 90 days.
For Starting on, leave as the default value.
Click Continue. No additional settings are needed.
Click Create.
Once the key is created, it can be used for a variety of implementations such as data encryption and decryption.
Symmetric keys are commonly used to encrypt sensitive data before storage or transmission. When data needs to be accessed or shared, the same symmetric key is used to decrypt the encrypted content, ensuring that only authorized parties can access the original information.
Click Check my progress to verify that you have completed this task correctly.
In this task, you'll create an asymmetric key with specific settings, including that of its algorithm and protection level.
In the Google Cloud console, click the Navigation menu ().
Select Security > Key Management. The Key Rings tabbed page opens, listing the newly-created key.
Under Name, click the link for the key you created in the previous task: demo-key-ring. The Key ring details page opens.
In the Keys tabbed page, click + Create Key.
Now, specify the key details.
For Key name, enter demo-asymmetric-key.
For Protection Level, select Software.
Click Continue. The Key material category expands.
For Key Material, select Generated key.
Click Continue. The Purpose and algorithm category expands.
For Purpose, select Asymmetric decrypt.
For Algorithm, leave as the default value.
Click Continue.
For Versions, no settings are required.
Click Continue. No additional settings are needed.
Click Create.
The asymmetric key for decryption should now be created.
Asymmetric keys can also be used for digital signatures. Digital signatures help verify the authenticity and integrity of messages, files, or software, ensuring that they have not been tampered with during transmission. Digital signatures use two keys, one for signing which involves the user's private key, and one for verifying signatures which involves the user's public key. The output of the signature process is called the digital signature.
Click Check my progress to verify that you have completed this task correctly.
Great work! Through this lab activity, you have gained practical experience in creating both symmetric and asymmetric keys, which play a crucial role in ensuring secure data and communication over networks.
Having created both types of keys, you now have a better understanding of their significance in cryptography. Your newfound ability to create these keys allows you to assist customers in securely storing large amounts of data.
Before you end the lab, make sure you’re satisfied that you’ve completed all the tasks. When you're ready, click End Lab and then click Submit.
Ending the lab will remove your access to the lab environment, and you won’t be able to access the work you've completed in it again.
Copyright 2024 Google LLC All rights reserved. Google and the Google logo are trademarks of Google LLC. All other company and product names may be trademarks of the respective companies with which they are associated.
This content is not currently available
We will notify you via email when it becomes available
Great!
We will contact you via email if it becomes available
One lab at a time
Confirm to end all existing labs and start this one