Take a look at this example for how to initialize a RawMasterKey with access to the public key and a RawMasterKey with access to the private key:
The RawMasterKey with access to the public key can be used for encryption, and the RawMasterKey with access to the private key can be used for decryption.
(Note that this links to example on one of our features branches. For future readers of this post, if this link is dead, look for this example on the master branch.)
Thanks. Works perfectly.
Curiously, I thought I had tried a pattern similar to that, but in all honesty I am no longer sure :)
Regardless, this is the tonic. I have also tried it with aws_encryption_sdk.stream(), as I will be dealing with bigger files and as expected, it worked perfectly.
I appreciate you taking the time to answer. Thanks!
AWS KMS keys for encrypting data before uploading to Amazon S3 GlacierAccepted Answerasked 2 years ago
sse-s3 encryption default permissionAccepted Answerasked 10 months ago
Use KMS grant to access to encrypted KMS - CMK S3 bucketasked 8 months ago
Cognito Custom Email Sender Code DecryptionAccepted Answerasked 7 months ago
AWS encryption SDK for .netasked 3 months ago
Help needed using AWS Encryption SDK, Python and RSA Public/Private keysasked 2 years ago
Does DocumentDB support client side encryption?asked a year ago
Application side data protection with FIPS 140-2 Level 3 : what to use out of Encryption SDK, KMS or Cloud HSM?asked 9 months ago
Using the encryption sdk within lambdaAccepted Answerasked 3 years ago
AWS Encryption SDK .Netasked 4 months ago