Pseudonymization method that generates deterministic encryption for the given input. Outputs a base64 encoded representation of the encrypted output. Uses AES-SIV based on the RFC https://tools.ietf.org/html/rfc5297. .. attribute:: crypto_key
The key used by the encryption function.
A context may be used for higher security and maintaining
referential integrity such that the same identifier in two
different contexts will be given a distinct surrogate. The
context is appended to plaintext value being encrypted. On
decryption the provided context is validated against the value
used during encryption. If a context was provided during
encryption, same context must be provided during decryption as
well. If the context is not set, plaintext would be used as
is for encryption. If the context is set but: 1. there is no
record present when transforming a given value or 2. the field
is not present when transforming a given value, plaintext
would be used as is for encryption. Note that case (1) is
expected when an InfoTypeTransformation
is applied to both
structured and non-structured ContentItem
\ s.