Encryption

Read about 4thTech encryption overview.

Encryption is one of the key parts of the infrastructure. There are three options available:

  1. Custom encryption

    Integrators have the option to develop their own specific encryption implementations.

  2. AES

    Natively AES-256-GCM (i.e. Advanced Encryption Standard) is used for the encryption algorithm. The secret key can be randomly generated or imported.

  3. AES - ECDH (i.e. Elliptic-Curve Diffie-Hellman)

    Natively AES-256-GCM is used for the encryption algorithm. The secret key is produced with ECDH secret key exchange. The sender needs the receiver Encryptor extensionarrow-up-right public key to be recorded on the blockchain. Encryptor extension is used to calculate the shared secret key.

Last updated