scispace - formally typeset
Search or ask a question
Topic

Format-preserving encryption

About: Format-preserving encryption is a research topic. Over the lifetime, 112 publications have been published within this topic receiving 2050 citations.


Papers
More filters
Proceedings ArticleDOI
08 Jul 2021
TL;DR: The implementation and current presentation of statistical analysis methods for encoding a message /converting code into plain text is proposed in this article, where the FPE was designed based on a block cipher and used as the basis for data encryption.
Abstract: The implementation and current presentation of statistical analysis methods for encoding a message /converting code into plain text is proposed in this paper. Data using Format-Preserving Encryption(FPE) is discussed in this article. FPE converts plaintext of a specific format into a ciphertext of the same format— e.g., converting valid credit card number (CCN) into valid CCN. To defend confidentiality or own data, cryptography is commonly used in routine apps like internet transfers, VPN systems, file encryption, or complete hard drives. When introducing an FPE scheme, the data structure is maintained, database structures are improved to secure, and the database integrity is ensured. It is suitable for masking data. Data masking hides or replaces a unique data form with random data Ensuring Data Security in Databases Using Format Preserving Encryption. In this project, the FPE was designed based on a block cipher and used as the basis for data encryption the RC5 bit encryption because RC5 has the variable word size, round numbers, and secret variable key. Also, active or protected format protection encryption/decryption systems and quantitative input data must be implemented to improve data security or ensure accurate and confidential messages. This approach's implementation helps all forms of data formats, but this work analyzes numerical information methodology, like CCN. This is tested by RC5 on multiple CCN, symmetric key encryption algorithm. The execution time of FPE is 4934470 nanoseconds. The execution time of the proposed format preserved RC5 algorithm is very less in comparison to the existing AES+FPE approach.
Patent
26 Jan 2021
TL;DR: The present disclosure relates to vaultless format-preserving tokenization systems and methods as discussed by the authors, which are based on a token format schema and use a secure tweak for the encoded input data.
Abstract: Embodiments of the present disclosure relate to vaultless format-preserving tokenization systems and methods. Some methods include encoding a first data set to produce encoded input data; generating a secure tweak for the encoded input data based on a token format schema by: encoding a tweak input to produce an encoded tweak input; and hashing the encoded tweak input along with a unique hashing key to generate the secure tweak; applying a format preserving encryption algorithm that utilizes the encoded input data, the secure tweak, and a unique encryption key to generate ciphertext output; and generating a token from the ciphertext output.
Patent
18 Jun 2020
TL;DR: A computer-implemented method of performing format-preserving encryption of a data object of variable size utilizing an inner encryption algorithm which is capable of taking a variable size input and of outputting, as its output, an encrypted version of the input.
Abstract: A computer-implemented method of performing format-preserving encryption of a data object of variable size utilizing an inner encryption algorithm which is capable of taking a variable size input and of outputting, as its output, an encrypted version of the variable size input. The method comprises compressing or encoding the data object in its totality to obtain a compressed or encoded version of the data object in a format compatible with the inner encryption algorithm, encrypting, by use of the inner encryption algorithm, the compressed or encoded version of the data object to obtain an encrypted version of the data object, and decompressing or decoding the encrypted version of the data object to obtain a decompressed or decoded version of the encrypted version of the data object, which constitutes a format-preserved encrypted version of the data object.
Proceedings ArticleDOI
30 Mar 2019
TL;DR: In this article, the authors present performance of statistical analysis of approaches for encrypting/decrypting data using FPE, FF1 with less computation and resource time, implementation of access control through selective encryption and providing secure access and sharing services for multi user's data using key distribution in the client side and access control lists.
Abstract: Storing an organization’s database at an external service provider has become extremely common. This popular practice is called as Database Outsourcing, in which, data encryption, crypto key, and access control are very important security issues, especially if the data owner wishes to publish his data for external use. In this paper, implementation & present performance of statistical analysis of approaches for encrypting/decrypting data using FPE, FF1 with less computation and resource time, implementation of access control through selective encryption and providing secure access and sharing services for multi user’s data using key distribution in the client side and access control lists is discussed. The primary goal of this paper is no requirement of re-distribution of keys or re-encryption of data for any administrative actions (updating access rights or adding/deleting users).

Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
86% related
Cryptography
37.3K papers, 854.5K citations
85% related
Public-key cryptography
27.2K papers, 547.7K citations
83% related
Hash function
31.5K papers, 538.5K citations
83% related
Password
35K papers, 389.6K citations
81% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20217
202013
201917
201813
201710
201613