Details
-
Task
-
Resolution: Done
-
Major - P3
-
None
-
None
-
None
-
None
-
Security 2022-03-07, Security 2022-03-21
-
55
Description
As a placeholder, the FLE2 code uses the FLE 1 algorithm
For FLE 2, we should use CTR-AEAD for user data encryption and CTR for all other encryption.