Decrypt Field Processor

Description

This processor decrypts a single encrypted string using a defined secret as well as a specified Initialization Vector (IV) field.

Use

Typically you would use the Decrypt processor to remove the encryption applied by the Encrypt processor.

Configuration

The Decrypt processor uses the same configuration options as the Encrypt processor.

OptionDescriptionExample
FieldThe field you want to decrypt..foo
Encryption algorithmThe encryption algorithm to apply. These options also determine how many characters to use for the encryption key and initialization vector.AES-256-CFB (key=32 characters, iv=16characters)
Encryption keyThe key used by the algorithm to encrypt the field.6B58703273357638792F423F4528482B
Initialization vector (IV) fieldThis value is used by the algorithm as the initialization key..encrypt_iv

Example

Before

JSON
Copy

Decryption Options

OptionValue
Field.foo
Decryption algorithmAES-256-CFB (key=32 characters, iv=16characters)
Decryption key6B58703273357638792F423F4528482B
Initialization vector (IV) field.encrypt_iv

After

JSON
Copy
Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard
  Last updated