Encryption Processor
In this article
Encryption operator allows data to be encrypted. The data coming out from a data source, which requires further processing and data security, this operator allows to hide the actual data during transformation or processing.
This is useful to hide or transform sensitive or confidential data such as credit card details, bank details, contact details, personal details etc. Encryption operator lets you to encrypt that sensitive information.
Processor Configuration
Output Field: Encrypted data field.
Algorithm Type: Encryption algorithm used to encrypt data.
Algorithm Type: Decryption algorithm used to encrypt data.
Algorithm | Key Size | Algorithm Values to be Used |
---|---|---|
AES | 128, 192, 256 bits | Symmetric key algorithm, uses Rijndael cipher. |
DES | 56 bits | Symmetric key algorithm, uses Feistel network. |
Triple DES | 112, 168 bits | Symmetric key algorithm, applies DES three times to each data block |
Blowfish | 32–448 bits | Symmetric key algorithm, uses Feistel network with key-dependent S-boxes |
RSA | 1024–4096 bits | Asymmetric key algorithm, uses two large prime numbers |
PGP | 128–4096 bits | Hybrid algorithm, combines symmetric and asymmetric encryption |
Input Field: The field to be encrypted.
Secret Key: A valid secret key used to encrypt data.
Key Format: Format of the secret key, which is hexadecimal or Base64 encoded.
It is important to encode the binary data to ensure it to be intact without modification when it is stored or transferred.
If you have any feedback on Gathr documentation, please email us!