Key States
Each key has its state that determines which operations can be performed using that key. Before performing any crypto operations, the state transitions need to be considered. A key can have following states throughout its lifecycle:
| Key States | Behavior | 
|---|---|
| Pre-Active | The key is not usable, exportable. No cryptographic operations are allowed. | 
| Active | The key can be used in protect and reveal operations. | 
| Compromised | The key can't be used to protect data. Only reveal operation is allowed. | 
| Deactivated | The key can't be used to protect and reveal data. | 
| Destroyed | The key bytes are no longer available for use. |