-
Notifications
You must be signed in to change notification settings - Fork 4
Closed
Description
A naive approach is to simply encrypt the data with the asymmetric key. This works but takes a very long time.
Current practice is to
- generate a random symmetric key of an appropriate length, ephemeral key
- encrypt the plain data with the ephemeral key using AES256-GCM or AES256-CTR
- encrypt the ephemeral key with the asymmetric key
- expose the encrypted data and encrypted ephemeral key
Metadata
Metadata
Assignees
Labels
No labels