An optional parameter to set the Customer-Supplied Encryption key.
Application developers can generate their own encryption keys to protect the data in GCS. This is known as a Customer-Supplied Encryption key (CSEK). If the application provides a CSEK, GCS does not retain the key. The object data, the object CRC32 checksum, and its MD5 hash (if applicable) are all encrypted with this key, and the key is required to read any of these elements back.
Care must be taken to save and protect these keys, if lost, the data is not recoverable. Also, applications should avoid generating predictable keys, as this weakens the encryption.
This option is used in read (download), write (upload), copy, and compose operations. Note that copy and compose operations use the same key for the source and destination objects.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-04-02 UTC."],[[["This webpage provides documentation for the `EncryptionKey` struct in the Google Cloud Storage C++ client library, spanning versions from 2.11.0 up to the latest release candidate, 2.37.0-rc."],["The `EncryptionKey` struct facilitates the use of Customer-Supplied Encryption Keys (CSEK) to protect data in Google Cloud Storage (GCS)."],["CSEK, when used, requires that the application provides an encryption key, which GCS does not retain and is necessary for reading encrypted object data and its associated checksums."],["The struct offers static functions, `FromBinaryKey` and `FromBase64Key`, for creating an `EncryptionKey` instance using either a raw binary key or a base64-encoded key, both requiring a 32-byte key."],["Data encrypted with CSEK keys is not recoverable if the keys are lost or applications generate predictable keys, therefore care must be taken to protect them."]]],[]]