StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Tokenization vs Encryption - Assignment Example

Cite this document
Summary
It restores the real sensitive data through detokenization after the use of the token using the tokenization system. Creation and maintenance of tokens…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97% of users find it useful
Tokenization vs Encryption
Read Text Preview

Extract of sample "Tokenization vs Encryption"

The paper "Tokenization vs. Encryption" is a wonderful example of an assignment on information technology. 1. Tokenization 1.1. Benefits of Tokenization 1.1.1. Reduced Exposure to security threats Tokenization minimizes the exposure of data to destruction and theft by storing data in a separate location from the tokens. It restores the real sensitive data through detokenization after the use of the token using the tokenization system. 1.1.2. Simplicity Creation and maintenance of tokens are simpler than encryption since it uses a simple identifier as opposed to the encryption key.

Likewise, detokenization uses the same identifier to convert the tokens to the original data, which is simpler than the use of decryption key in encryption and decryption processes. 1.2. Weaknesses of Tokenization 1.2.1. Limited Data Tokenization is not able to operate on all the data to be protected especially in larger institutions. This will imply the creation of numerous tokens, which may not be easy to manage. 1.2.2. Limited Compatibility Tokenization works well with a few specific applications and technologies of data processing, but not all.

The acquisition of relevant applications for its operation is very costly. 2. Encryption 2.1. Benefits of Encryption 2.1.1. Improved Security Encryption provides more secure data than tokenization from the end to the point of data processing. It can, therefore, prevent unauthorized access to the information unless one has the decryption key. 2.1.2. Integration with Technologies Encryption and decryption mechanisms are able to integrate well with the existing processes and technologies. 2.2. Weaknesses of Encryption 2.2.1.

Vulnerability to Malware Data encryption exposes the data to attack by sniffer malware through breaches of security best practices. Sniffers are able to grab information from the memory once the decryption is complete (Bergstein 2004, p43). This nullifies the value of the encryption solution. 2.2.2. Increased Processing Cost The process of encryption and decryption introduces additional overhead, as it requires more resources. The resources include the encryption and decryption application, as well as the secure storage media. 3. A choice between Encryption and Tokenization Even though both encryption and decryption perform the function of data protection, tokenization is the best method, considering its treatment of data.

It stores the original data in a separate location from the tokens, such that any destructive event on the tokens cannot affect the original data. In encryption, the original data is encrypted and no copy of it is left in its original form. Failure to decrypt it means that the data is lost permanently (Agre & Rotenberg 1998, p. 55). Secondly, it is easier to map back the token to its original sensitive data than performing the decryption. This is because, in tokenization, the process uses reliable random numbers, unlike the complicated decryption keys.

Thirdly, encryption exposes the data to malware attacks (Bergstein 2006, p47). Malware sniffers are able to read the data immediately after its decryption, thus losing the whole data. In tokenization, it is not possible for the malware sniffer to realize when the mapping of the tokens takes place, as it uses random numbers. With all the benefits of tokenization, it is safer and more reliable to protect data through the tokenization system (Schmitt & Stahl 2012, p. 42). Tokenization system is under dynamic development that is likely to make the future versions of the systems more robust.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Tokenization vs Encryption Assignment Example | Topics and Well Written Essays - 500 words, n.d.)
Tokenization vs Encryption Assignment Example | Topics and Well Written Essays - 500 words. https://studentshare.org/information-technology/1859588-tokenization-vs-encryption
(Tokenization Vs Encryption Assignment Example | Topics and Well Written Essays - 500 Words)
Tokenization Vs Encryption Assignment Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1859588-tokenization-vs-encryption.
“Tokenization Vs Encryption Assignment Example | Topics and Well Written Essays - 500 Words”. https://studentshare.org/information-technology/1859588-tokenization-vs-encryption.
  • Cited: 0 times

CHECK THESE SAMPLES OF Tokenization vs Encryption

Information Technology and Public Key Cryptography

Similarly, the RSA cryptography standard is associated with a Public Key Cryptography Standards (PKCS) that highlights data encryption by utilizing RSA algorithm.... The syntax is utilized for digital certificates and the syntax for private keys is utilized for private key encryption (RSA Cryptography Standard.... RSA public key encryption algorithm converts the private key to public key.... standards that are associated with deploying public key cryptographic encryption along with digital signatures with appendix....
4 Pages (1000 words) Essay

Encryption System: TrueCrypt

In the paper “encryption System: TrueCrypt” the author analyzes the system TrueCrypt, which takes care of by its “ on-the-fly encryption” that makes the data encrypted/decrypted automatically even before it is loaded or saved.... A password or encryption keys are needed to read the data being stored.... hellip; The author states that the encryption is “automatic, real-time and transparent “ and the virtual encrypted disk mounts as if it is a real disk....
2 Pages (500 words) Assignment

Data Encryption

PGP completes Disk encryption from Symantec Corporation that offers organizations with complete, supreme performance complete disk encryption intended for the entire data (swap files, user files, concealed files, system files, etc.... on laptops, desktops as well as removable… This system offers business a centralized management of operations that is possible through the regular, centralized strategy enforcement by means of single web-based organization console for the entire users. PassMonster is able to carry out the insoluble job of Data encryption By Software Brief of the program and what it claims to do Specific business needs being addressed by program and value delivered by itYour reasons why you decided to check it out (first impression)Your overall evaluation of it, to the degree that you can judge; is it something youd use?...
3 Pages (750 words) Essay

Mathematical Focus on RSA Public & Private Key encryption

A digital signature is a mathematical scheme that consists of three parts, namely a key generation signing algorithm, a signing algorithm and a signature verifying algorithm, and they are used in e-commerce. In the United States of America, and the European Union, there are… This paper takes a look at the various legal standings of digital signatures and their relations to RSA public and private key....
5 Pages (1250 words) Research Paper

Report on Public Key Encryption

As a result, the public key encryption provides an identity to the world.... However, public key encryption makes use of long numbers.... These numbers are known as keys (Ferguson Public Key encryption The world has become electronic in almost all its activities.... As a result, the public key encryption provides an identity to the world.... However, public key encryption makes use of long numbers.... This paper, therefore, provides a detailed report on Public Key encryption....
1 Pages (250 words) Assignment

WiFi, VPNs & Encryption

Basically, this mechanism allows the system users to run their processes using the minimum WiFi, VPNs and encryption WiFi, VPNs and encryption Affiliation In the past few years, there have emerged a wide variety of security attacks such as viruses, worms and so many other types of security threats....
1 Pages (250 words) Assignment

Final project

RSA particularly works by simple mathematical relationships both in key generation, encryption and decryption.... In public key cryptography, encryption and description permit two conveying gatherings to mask data they send to one another.... RSA (Rivest, Adleman and Shamir) cryptosystem is currently one of the most practical and widely used public-key cryptosystems especially in the field of data security....
4 Pages (1000 words) Research Paper

Phone Call Encryption

The paper "Phone Call encryption" highlights that there is always an increase in the cost of encryption when there is a need for alternative data storage.... The cost will increase as there will be the need for transferring the data in the phone to an alternative storage device… Phone encryption is important and when compared to the cost, there is a need to carry out the encryption.... Phone encryption is important to business as it is able to store and protect data that is sensitive to the business away from the access of those that are not authorized....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us