...
The encryption vector and key are necessary to form a reliable two way hash, and can be overridden by runtime properties.
Warning | ||
---|---|---|
| ||
Changing the init vector and secret key values in the runtime properties file after data is encrypted will invalidate encrypted data! |
...