Overview
The Decryption function is used to restore encrypted (secured) data that has been processed by the Encryption function. All data entered in fields are encrypted by a strong cipher. The original information can be accessed only by using a decryption algorithm.
Configuration
To configure the Decryption function, specify details in the following sections:
Input Fields
Select the encrypted fields that you want to decrypt from the connected processor function.
Decryption Scheme
Use the Secrets Wallet toggle to select a Key that you have stored in your Secrets Wallet.
Note | ||
---|---|---|
| ||
The decryption key must be exactly 64 hexadecimal characters long. |
Decryption Algorithm
Select a suitable decryption algorithm. You can select a decryption algorithm of your choice from the list below. Currently, the following types are supported:
- AES-256-GCM
- AES-256-CTR
- AES-256-CBC
Note | ||
---|---|---|
| ||
The output result of the Decryption function is always of the "string" type. If another type is needed, then another function needs to be applied to convert it. |