Data Encryption Component Overview
This is an old article whose contents have been moved to Encryptor
Encryption Components provide out-of-the-box support for secure, encrypted communication between two systems in situations where they need pipeline data encrypted outside of pure network communications. For example, a user may have a pipeline with data that originates on System A, is routed through System B, and arrives on System C. In a basic pipeline, the data is encrypted as it transits between Systems A and B, and again as it transits from System B to System C. However, the data is unencrypted during its brief stay on System B. If it is desirable for the information to be kept protected while on System B, a user can use the built-in cryptography components to encrypt the data before it leaves System A, and decrypt it after it arrives on System C.
The encryption components act as a pair: an Encryptor and a Decryptor. This pair will operate together to negotiate a secret encryption key that is used to securely share data. Once that negotiation is complete, data can be fed into the Encryptor, encrypted with the negotiated encryption key, and output the encrypted data into the pipeline. When the data arrives at the Decryptor, it is decrypted using the negotiated encryption key, and the decrypted data is output into the pipeline.
Figure 1 - Block Diagram of the Encryption components showing how they connect and the types of data passing between their input and output channels.