Topic
Format-preserving encryption
About: Format-preserving encryption is a research topic. Over the lifetime, 112 publications have been published within this topic receiving 2050 citations.
Papers published on a yearly basis
Papers
More filters
08 Jul 2021
TL;DR: The implementation and current presentation of statistical analysis methods for encoding a message /converting code into plain text is proposed in this article, where the FPE was designed based on a block cipher and used as the basis for data encryption.
Abstract: The implementation and current presentation of statistical analysis methods for encoding a message /converting code into plain text is proposed in this paper. Data using Format-Preserving Encryption(FPE) is discussed in this article. FPE converts plaintext of a specific format into a ciphertext of the same format— e.g., converting valid credit card number (CCN) into valid CCN. To defend confidentiality or own data, cryptography is commonly used in routine apps like internet transfers, VPN systems, file encryption, or complete hard drives. When introducing an FPE scheme, the data structure is maintained, database structures are improved to secure, and the database integrity is ensured. It is suitable for masking data. Data masking hides or replaces a unique data form with random data Ensuring Data Security in Databases Using Format Preserving Encryption. In this project, the FPE was designed based on a block cipher and used as the basis for data encryption the RC5 bit encryption because RC5 has the variable word size, round numbers, and secret variable key. Also, active or protected format protection encryption/decryption systems and quantitative input data must be implemented to improve data security or ensure accurate and confidential messages. This approach's implementation helps all forms of data formats, but this work analyzes numerical information methodology, like CCN. This is tested by RC5 on multiple CCN, symmetric key encryption algorithm. The execution time of FPE is 4934470 nanoseconds. The execution time of the proposed format preserved RC5 algorithm is very less in comparison to the existing AES+FPE approach.
Patent•
26 Jan 2021
TL;DR: The present disclosure relates to vaultless format-preserving tokenization systems and methods as discussed by the authors, which are based on a token format schema and use a secure tweak for the encoded input data.
Abstract: Embodiments of the present disclosure relate to vaultless format-preserving tokenization systems and methods. Some methods include encoding a first data set to produce encoded input data; generating a secure tweak for the encoded input data based on a token format schema by: encoding a tweak input to produce an encoded tweak input; and hashing the encoded tweak input along with a unique hashing key to generate the secure tweak; applying a format preserving encryption algorithm that utilizes the encoded input data, the secure tweak, and a unique encryption key to generate ciphertext output; and generating a token from the ciphertext output.
Patent•
18 Jun 2020
TL;DR: A computer-implemented method of performing format-preserving encryption of a data object of variable size utilizing an inner encryption algorithm which is capable of taking a variable size input and of outputting, as its output, an encrypted version of the input.
Abstract: A computer-implemented method of performing format-preserving encryption of a data object of variable size utilizing an inner encryption algorithm which is capable of taking a variable size input and of outputting, as its output, an encrypted version of the variable size input. The method comprises compressing or encoding the data object in its totality to obtain a compressed or encoded version of the data object in a format compatible with the inner encryption algorithm, encrypting, by use of the inner encryption algorithm, the compressed or encoded version of the data object to obtain an encrypted version of the data object, and decompressing or decoding the encrypted version of the data object to obtain a decompressed or decoded version of the encrypted version of the data object, which constitutes a format-preserved encrypted version of the data object.
Posted Content•
30 Mar 2019
TL;DR: In this article, the authors present performance of statistical analysis of approaches for encrypting/decrypting data using FPE, FF1 with less computation and resource time, implementation of access control through selective encryption and providing secure access and sharing services for multi user's data using key distribution in the client side and access control lists.
Abstract: Storing an organization’s database at an external service provider has become extremely common. This popular practice is called as Database Outsourcing, in which, data encryption, crypto key, and access control are very important security issues, especially if the data owner wishes to publish his data for external use. In this paper, implementation & present performance of statistical analysis of approaches for encrypting/decrypting data using FPE, FF1 with less computation and resource time, implementation of access control through selective encryption and providing secure access and sharing services for multi user’s data using key distribution in the client side and access control lists is discussed. The primary goal of this paper is no requirement of re-distribution of keys or re-encryption of data for any administrative actions (updating access rights or adding/deleting users).