Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 6 Next »

Overview

The Decryption function is used to restore encrypted (secured) data that has been processed by the Encryption function. All content in the selected data will be encrypted by a strong cipher. The original information can be accessed only by using a decryption algorithm. 

Configuration

To configure the Decryption function, specify details in the following sections:

Input Fields

Select the encrypted data that you want to decrypt from the connected processor function. 

Decryption Scheme

Use the Secrets Wallet toggle to select a Key that you have stored in your Secrets Wallet. 

Note!

eThe decryption key must be exactly 64 hexadecimal characters long.

Decryption Algorithm

Select a suitable decryption algorithm.  You can select a decryption algorithm of your choice from the list below. Currently, the following types are supported: 

  • AES-256-GCM
  • AES-256-CTR 
  • AES-256-CBC

Note!

The output result of the Decryption function is always of the "string" type. If another type is needed, then another function needs to be applied to convert it. 

  • No labels