-
Notifications
You must be signed in to change notification settings - Fork 14
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Create a new, more flexible CryptoProvider API and Injection point #1254
Comments
I have had some issues with changing the implementation of this OLD interface. This NEW interface would have been nice to have. I approve related like implementation: https://github.com/opentdf/platform/pull/1213/files#diff-42a6b8bf0a5ad498dd5d9f49458e53bf11ac3a6aaf3fa9c03e1e9b3c918bbe4b |
Also, I would like this to be an exposed, non-internal interface |
I like it! Do you think that we could get by without a symmetric key derivation and maybe bury that in Also, is it possible to not have clients specifying the Algorithm and have that implied by the key? I don't know the system well enough to know if this is the way that this should work. |
Yeah, it may make sense to hide derive since that would allow us the freedom to implement a 'fully hsm' solution where the derived key is only exported in an encapsulation, if that makes sense from a security/cost/feature perspective |
@dmihalcik-virtru is this work complete? |
I've moved tracking of this to jira; I'll probably need to update the proposed API to enable ECEIS encryption for ztdf, as well |
The current cryptoProvider API looks like this:
OLD
We should use a new, simplified crypto provider API that provides clear functional boundaries and extension points.
NEW
Do we need key generation? Arguably this should be under the hood and part of initialization/setup.
See also: #1049
The text was updated successfully, but these errors were encountered: