Unhash online dating
This is also easily detectable, although recovering the key may be more — possibly much more — difficult.) In fact, the methods to use for breaking your cipher are basically the same as one would use to break a simple Caesar cipher.Both are simple additive monoalphabetic substitution ciphers; the only difference is that, in your case, the "alphabet" consists of months rather than of letters.They use an AWS KMS customer master key (CMK) in the encryption operations and they cannot accept more than 4 KB (4096 bytes) of data.Although you might use them to encrypt small amounts of data, such as a password or RSA key, they are not designed to encrypt application data.
Yes, that's exactly what format-preserving encryption does.
To encrypt application data, use the server-side encryption features of an AWS service, or a client-side encryption library, such as the AWS Encryption SDK or the Amazon S3 encryption client.
The Encrypt operation is designed to encrypt data keys, but it is not frequently used.
First is it even possible for someone to recognize that the result was encrypted?
The values all appear to be legitimate, real, non-scrambled values, just as the originals were (only displaced in time) If for some reason they figured out that the numeric values were encrypted, would they even be able to decrypt them to their original values?