About: Format-preserving encryption is a research topic. Over the lifetime, 112 publications have been published within this topic receiving 2050 citations.
Papers published on a yearly basis
01 Sep 2016
TL;DR: In this paper, a format-preserving encryption method based on linear transformation was proposed, in which a natural number set having a number of elements less than a predetermined value based on the type and length of characters of plain text data was computed.
Abstract: The present invention relates to a format-preserving encryption method based on linear transformation. The format-preserving encryption method according to an aspect of the present invention comprises the steps of: computing a natural number set having a number of elements less than a predetermined value based on the type and length of characters of plain text data; generating a plurality of character strings based on the type and length of characters of the plain text data; substituting each of the character strings with natural numbers of the natural number set based on a preset substitution rule; generating a configuration value set composed of a predetermined number of natural numbers of the natural number set; and encrypting the plain text data by performing primary and secondary operations by using a plurality of operation expressions composed of the configuration value set.
27 Feb 2016
TL;DR: Various techniques of FPE are described, Its pros and cons and survey done on these techniques are done and a comparison of all techniques is concluded.
Abstract: Cryptography is a technique used to transmit data in a secured way using encryption and decryption. Encryption is the process of converting information from its original form (plain text) into an unintelligible form (cipher text).In Cryptography many traditional algorithms introduced to provide security to sensitive data but encrypted data changes its length and format. There is a requirement to change existing database schema. Format Preserving Encryption mechanism there is no need to change database schema. It is a way to encrypt data such that the cipher text has the same length and format as the plaintext. This paper describes various techniques of FPE, Its pros and cons and survey done on these techniques. Finally it concludes by comparison of all techniques.
TL;DR: An algorithm named Cycle-Prefix is put forward, which enhances the security and dynamics of FPE by using two adjustment factors and the circular encryption, compared with the traditional Prefix algorithm.
Abstract: In the era of big data, government, business and personal digital information will be possible for data mining. Data mining requires massive data as a support. However, the direct release of the original mass data, which usually contain some sensitive information of personal or analysis, will result in leakage of user privacy. Therefore, it is becoming increasingly important to protect privacy information in data publishing. In this paper, we focus on the multi-type self-identified format-preserving encryption. First, we introduce a multi-type self-identified format-preserving encryption system and discuss the encryption of various types of data in this system. Then, for the format preserving encryption (FPE) about Chinese name, we study from the encryption model construction and basic encryption scheme. The format-preserving encryption model about Chinese name is constructed and the concept of the name library is presented. Based on this, it is used to not only limit the message space to reduce complexity, but also ensure the cipher in accordance with the Chinese naming habits. In addition, according to the encryption and decryption model, format-preserving encryption process of Chinese name is designed. In order to add new names, the algorithm of name space expansion is proposed. Based on the Prefix, this paper put forward an algorithm named Cycle-Prefix, which enhances the security and dynamics of FPE by using two adjustment factors and the circular encryption. Compared with the traditional Prefix algorithm, experiments show that Cycle-Prefix can not only complete the task of FPE for Chinese name, but also encrypt same plain text into different ciphers under the premise of similar efficiency with Prefix.
13 Apr 2020
TL;DR: In this paper, a privacy masking method using a format preservation encryption technique in an image security system and a recording medium for performing the same was described, which may prevent the waste of additional space required by encryption and solve the problem of exposure of personal information by encrypting an image corresponding to a privacy area using the format preservation encrypt technique.
Abstract: Disclosed in the present invention are a privacy masking method using a format preservation encryption technique in an image security system and a recording medium for performing the same. According to one aspect of the present invention, the privacy masking method using the format preservation encryption technique in the image security system may prevent the waste of additional space required by encryption and, at the same time, solve the problem of exposure of personal information by encrypting an image corresponding to a privacy area using the format preservation encryption technique.
••11 Jun 2019
TL;DR: The purpose of the proposed Genetic based Key Splitting algorithm is to generate the best random two keys that have maximum difference so that the two keys cannot be derived from each other.
Abstract: Database as a service is one of the important services provided by Cloud Computing. Recently, a Two Layered Protection Scheme for securing the database has been proposed. The scheme employs two symmetric key encryption algorithms, the Order Preserving Encryption and Format Preserving Encryption. Each of the two encryption algorithms uses a different encryption key that is derived from Key Splitting module. Key Splitting module generates two keys from a Main Key by using a randomized algorithm. Randomized algorithm does not guarantee that the generated keys are always different because the resulting keys depend on the generated random numbers. Hence, in order to increase the security of the Two Layered Protection Scheme, a Genetic based Key Splitting algorithm is proposed. The purpose of the proposed algorithm is to generate the best random two keys that have maximum difference so that the two keys cannot be derived from each other. Simulation results have shown that the proposed algorithm generates random keys with maximum difference.