[ https://issues.apache.org/jira/browse/SPARK-43286?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Max Gekk reassigned SPARK-43286: -------------------------------- Assignee: Steve Weis > Update CBC mode in aes_encrypt()/aes_decrypt() to not use KDF > ------------------------------------------------------------- > > Key: SPARK-43286 > URL: https://issues.apache.org/jira/browse/SPARK-43286 > Project: Spark > Issue Type: Improvement > Components: SQL > Affects Versions: 3.5.0 > Reporter: Steve Weis > Assignee: Steve Weis > Priority: Major > Original Estimate: 168h > Remaining Estimate: 168h > > The current implementation of AES-CBC mode called via `{{{}aes_encrypt{}}}` > and `{{{}aes_decrypt{}}}` uses a key derivation function (KDF) based on > OpenSSL's > [EVP_BytesToKey|https://www.openssl.org/docs/man3.0/man3/EVP_BytesToKey.html]. > This is intended for generating keys based on passwords and OpenSSL's > documents discourage its use: _"Newer applications should use a more modern > algorithm"._ > `{{{}aes_encrypt{}}}` and `{{{}aes_decrypt{}}}` should use the key directly > in CBC mode, as it does for both GCM and ECB mode. The output should then be > the initialization vector (IV) prepended to the ciphertext – as is done with > GCM mode: > {{(16-byte randomly generated IV | AES-CBC encrypted ciphertext)}} -- This message was sent by Atlassian Jira (v8.20.10#820010) --------------------------------------------------------------------- To unsubscribe, e-mail: issues-unsubscr...@spark.apache.org For additional commands, e-mail: issues-h...@spark.apache.org