Skip to content

[Java] CMM cache policy on decryption DEKs #841

@mkeskells

Description

@mkeskells

While profiling an application I could find latency spikes, relate to decryption

If an application is regularly using a DEK for decryption, it can expire due to its TTL
As I read the code the TTL is set when the key is created. Is seems sensible that the key would expire when not used, but if used frequently why should it expire?

I appreciate that its a bit harder to manage different expiration policy for encryption and decryption, and that old unused DEKs should be expired, but it seems to me that this isn't the case for frequently used decryption DEKs.
The decryption materials if deleted would be creates again moments later (I am presuming the same materials), so this seems to be an unnessessary latency

Could we either refresh in the background, or change the eviction semantics

Happy to contribute/colaborate but will need some steer for the existing maintainers

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions