Forum Discussion
Those give away key information on what stratergy is used by an organization for encryption. Also, the attributes I mentioned are key attributes required for encryption.
These are sensitive data.
Pipeline exec vs Iltra ppipeline decision would take this chain in a different direction. Let’s consider the fact that we need to utilize this Ultra pipelines.
The encryption algorithm in use is not a secret. You can hardcode the algorithm if you want, but it won’t increase security. In some use cases, it can make things less secure since the interface will be stuck with a single algorithm. Then, if that algorithm becomes vulnerable, it will be difficult to change while remaining backwards compatible during the transition period.
No, they are not sensitive. If you don’t want to believe me, please do some of your own research.
Here is a section on IVs in Wikipedia to start:
An initialization vector has different security requirements than a key, so the IV usually does not need to be secret.