Hello, I want to encrypt my data, which RPA components should I use for this?
Various encryption algorithms are available to make it difficult or prevent the capture of information during the use of some sensitive data. Algorithms work by encrypting the requested data with a specified key. Encrypted data is used as desired by users. The encryption key is required to restore this data to its meaningful initial state.
The following example illustrates the use of Robusta RPA components through an example.
- A text type data is defined in the Data Objects field of the process. The data does not have to be defined in the variable, but is kept in a variable in the example scenario as it may be used repeatedly.
First of all, with the help of the “Generate Key” component, an encryption key is created by selecting the one to be used from the supported algorithms from the “Encryption type” field. The generated encryption key is saved in the variable written in the “Result key” field.
In the second stage, the “Encryption” component is used to encrypt the data we want to be encrypted. The data to be encrypted is entered into the “Plain text” field on this component. This data can be defined as a variable or written directly. Then, the same algorithm that we generated the encryption key for in the previous step is selected from the “Encryption type” field. The variable that we will keep the encrypted version of the data is defined in the “Result cipher text” field. Finally, the encryption key created in the previous step is written in the “Key” field.
In order to access the encrypted data, the password is decrypted with the key used to encrypt the data. At this stage, the “Decryption” component is used. Encrypted data is entered into the “Cipher text” field. For encryption, the encryption algorithm used in the encryption phase is selected from the “Decryption type” field. The data (original version of the data) containing the result will be transferred to the variable to be defined in the “Result plain text” field. In order for this process to take place, the encryption key used in the encryption phase is entered in the “Key” field.
When the process is run, an encryption key is generated for the selected algorithm. Then, the data we define in a variable in the “Data Objects” field is encrypted. Finally, the encrypted data is decrypted.