We have discovered that the encryption configuration can be further simplified by simply furnishing the secret. This is attributed to the similarity of the encryption protocols AES-256-CBC, AES-192-CBC, and AES-128-CBC, as they all employ a similar process when encrypting data. The sole distinction lies in the size of the encryption block, which is directly related to the key length. Therefore, we can make use of the key length to determine which encryption algorithm to utilize. With this, providing the encryption algorithm in the config.yml becomes obsolete.
We have discovered that the encryption configuration can be further simplified by simply furnishing the secret. This is attributed to the similarity of the encryption protocols AES-256-CBC, AES-192-CBC, and AES-128-CBC, as they all employ a similar process when encrypting data. The sole distinction lies in the size of the encryption block, which is directly related to the key length. Therefore, we can make use of the key length to determine which encryption algorithm to utilize. With this, providing the encryption algorithm in the config.yml becomes obsolete.