Unfortunately, Ruby's OpenSSL plugin as shipped with v0.1.4 doesn't support any authenticated encryption algorithms, so it's impossible to tell if anyone tampered with my data after encryption. This is the output from Ruby:
This is only a limited subset of what OpenSSL actually supports underneath the hood. It seems that the Ruby OpenSSL library isn't too recent. By upgrading the Ruby OpenSSL binding, we'd also be able to use authenticated ciphers like AES-{128,192.256}-GCM. On Ubuntu 14.04 if I just run the following, here's what I see that OpenSSL natively supports:
Unfortunately, Ruby's OpenSSL plugin as shipped with v0.1.4 doesn't support any authenticated encryption algorithms, so it's impossible to tell if anyone tampered with my data after encryption. This is the output from Ruby:
This is only a limited subset of what OpenSSL actually supports underneath the hood. It seems that the Ruby OpenSSL library isn't too recent. By upgrading the Ruby OpenSSL binding, we'd also be able to use authenticated ciphers like AES-{128,192.256}-GCM. On Ubuntu 14.04 if I just run the following, here's what I see that OpenSSL natively supports:
AES-256-GCM
is listed as being supported, but it's unavailable within the the cipher filter, possibly due to an old Ruby OpenSSL bindings library.