Overview
The Encryption function provides secure data masking capabilities utilizing a cipher. Users can select the input data and encrypt them using the desired algorithm. All entered fields are processed according to the user input configuration and transformed following the adopted standards of the chosen algorithm. To restore the original field data the Decryption function must be used.
Configuration
To configure the Encryption function, specify details in the following sections:
Input Fields
Select the encrypted fields that you want to encrypt from the connected processor function. You can also specify a new input field in Fields and click + Add to add it to the list.
Currently, the supported value types are string, number, boolean, and date.
Encryption Scheme
Use the Secrets Wallet toggle to select a Key that you have stored in your Secrets Wallet.
Encryption Algorithm
Select a suitable encryption algorithm. You can select an encryption algorithm of your choice from the list below. Currently, the following types are supported:
- AES-256-GCM
- AES-256-CTR
- AES-256-CBC
All encryption/decryption algorithms are implemented according to official specifications, for more information on how data is processed refer to the released documentation on the matter.
AES-256-GCM is discussed in the NIST (National Institute of Standards and Technology) SP (Special Publication) 800-30D on Computer Security. AES-256 is documented in the FIPS (Federal Information Processing Standards) Publication 197 on AES.