[ 
https://issues.apache.org/jira/browse/IGNITE-8485?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16512222#comment-16512222
 ] 

Vladimir Ozerov commented on IGNITE-8485:
-----------------------------------------

Hi, [~NIzhikov].

Several preliminary questions around API:
1) Why do we use master key to encrypt WAL records? I looked through all record 
types marked as "encryptable" and all of them has cache group ID, i.e. it is 
possible to get CEKs for them. If you replace MEK with CEK here, then it would 
be possible to remove {{CipherSpi#masterKey}} method.
2) {{CipherSpi#create}} and {{CipherSpi#encryptKey}} are always used near each 
other (2 times each). I would remove {{CipherSpi#create}} method and modify API 
as follows:
{code}
byte[] createEncryptedCacheKey();
K decryptCacheKey(byte[] keyBytes);
{code}

What do you think?


> TDE - Phase-1
> -------------
>
>                 Key: IGNITE-8485
>                 URL: https://issues.apache.org/jira/browse/IGNITE-8485
>             Project: Ignite
>          Issue Type: Sub-task
>            Reporter: Nikolay Izhikov
>            Assignee: Nikolay Izhikov
>            Priority: Critical
>             Fix For: 2.6
>
>
> Basic support for a Transparent Data Encryption should be implemented:
> 1. Usage of standard JKS, Java Security.
> 2. Persistent Data Encryption/Decryption.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

Reply via email to