public sealed class CryptoKey : IMessage<CryptoKey>, IEquatable<CryptoKey>, IDeepCloneable<CryptoKey>, IBufferMessage, IMessage
This is a data encryption key (DEK) (as opposed to
a key encryption key (KEK) stored by Cloud Key Management Service
(Cloud KMS).
When using Cloud KMS to wrap or unwrap a DEK, be sure to set an appropriate
IAM policy on the KEK to ensure an attacker cannot
unwrap the DEK.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-07 UTC."],[[["\u003cp\u003eThe page documents the \u003ccode\u003eCryptoKey\u003c/code\u003e class within the \u003ccode\u003eGoogle.Cloud.Dlp.V2\u003c/code\u003e namespace, focusing on data encryption keys (DEKs) used in the Google Cloud Data Loss Prevention (DLP) API.\u003c/p\u003e\n"],["\u003cp\u003eIt provides a list of available versions of the \u003ccode\u003eCryptoKey\u003c/code\u003e class, ranging from the latest version 4.16.0 down to version 2.15.0, with links to the specific documentation for each.\u003c/p\u003e\n"],["\u003cp\u003e\u003ccode\u003eCryptoKey\u003c/code\u003e is a sealed class that implements several interfaces including \u003ccode\u003eIMessage\u003c/code\u003e, \u003ccode\u003eIEquatable\u003c/code\u003e, \u003ccode\u003eIDeepCloneable\u003c/code\u003e, and \u003ccode\u003eIBufferMessage\u003c/code\u003e, inheriting from the base \u003ccode\u003eObject\u003c/code\u003e class.\u003c/p\u003e\n"],["\u003cp\u003eThe class supports three types of crypto keys: \u003ccode\u003eKmsWrapped\u003c/code\u003e, \u003ccode\u003eTransient\u003c/code\u003e, and \u003ccode\u003eUnwrapped\u003c/code\u003e, each serving different purposes in key management and encryption processes.\u003c/p\u003e\n"],["\u003cp\u003eIt highlights the importance of setting appropriate IAM policies on the key encryption key (KEK) when using Cloud KMS to wrap or unwrap a DEK.\u003c/p\u003e\n"]]],[],null,[]]