Skip to content

Encrypting data #7

@richardschneider

Description

@richardschneider

A naive approach is to simply encrypt the data with the asymmetric key. This works but takes a very long time.

Current practice is to

  • generate a random symmetric key of an appropriate length, ephemeral key
  • encrypt the plain data with the ephemeral key using AES256-GCM or AES256-CTR
  • encrypt the ephemeral key with the asymmetric key
  • expose the encrypted data and encrypted ephemeral key

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions