-
Type: Task
-
Resolution: Done
-
Priority: Major - P3
-
None
-
Affects Version/s: None
-
Component/s: None
-
Labels:None
-
Security 2022-03-07, Security 2022-03-21
-
55
As a placeholder, the FLE2 code uses the FLE 1 algorithm
For FLE 2, we should use CTR-AEAD for user data encryption and CTR for all other encryption.