Encryption
Overview
The Encryption function provides secure data masking capabilities using a cipher. Users can select the input data and encrypt it using the desired algorithm. All entered fields are processed according to the user input configuration and transformed following the adopted standards of the chosen algorithm. To restore the original field data, the Decryption function must be used.
Configuration
To configure the Encryption function, specify details in the following sections:
Input fields
Select the encrypted fields that you want to encrypt from the connected processor function. You can also specify a new input field in Fields and click + Add to add it to the list.
Currently, the supported value types are string, number, boolean, and date.
Encryption scheme
Enter the encryption key used by the selected encryption scheme.
Note!
The Key field only accepts parameter reference and requires you to use Global parameters.
Note!
The encryption key must be exactly 64 hexadecimal characters long.
Algorithm
Select a suitable encryption algorithm. You can select an encryption algorithm of your choice from the list below. Currently, the following types are supported:
AES-256-GCM
AES-256-CTR
Note!
All encryption/decryption algorithms are implemented according to official specifications. For more information on how data is processed, refer to the released documentation on the matter.
AES-256-GCM is discussed in the NIST (National Institute of Standards and Technology) SP (Special Publication) 800-30D on Computer Security.
AES-256 is documented in the FIPS (Federal Information Processing Standards) Publication 197 on AES.