Skip to main content

Cryptography

The Cryptography package provides secure encryption, decryption, hashing, and digital signature operations for your RPA workflows. It supports industry-standard algorithms including AES, 3DES, SHA, MD5, BLAKE, and RSA for comprehensive cryptographic operations.

Use Cases

  • Encrypt sensitive data before storage or transmission
  • Decrypt protected files and text
  • Generate cryptographic hashes for data integrity verification
  • Create and verify digital signatures
  • Generate secure random keys for encryption
  • Create HMAC signatures for authentication

Available Nodes

Encryption & Decryption

  • Encrypt Text - Encrypt plain text using AES or 3DES algorithms
  • Decrypt Text - Decrypt cipher text using AES or 3DES algorithms
  • Encrypt File - Encrypt files using AES or 3DES algorithms
  • Decrypt File - Decrypt files using AES or 3DES algorithms

Hashing

  • Text Hash - Generate cryptographic hashes from text (MD5, SHA1, SHA256, SHA512, BLAKE, Whirlpool)
  • File Hash - Generate cryptographic hashes from files (MD5, SHA1, SHA256, SHA512, BLAKE, Whirlpool)

Digital Signatures

  • Sign - Create RSA digital signatures using private keys
  • Verify - Verify RSA digital signatures using public keys
  • HMAC Signature - Generate HMAC signatures for message authentication

Key Management

  • Generate Key - Generate secure random cryptographic keys

Security Best Practices

  • Store encryption keys securely using Robomotion Vault
  • Use strong encryption algorithms (AES-256, SHA-256 or higher)
  • Never hardcode keys in your flows
  • Generate new keys regularly for sensitive operations
  • Use appropriate key sizes (minimum 128-bit for AES, 2048-bit for RSA)
  • Verify data integrity using hash comparisons
  • Use HMAC for message authentication when needed