Skip to main content
Version: 3.0

Token Algorithm

Replaces original string data values with an encrypted string token using a secure cipher. A encrypted password is used with the cipher to generate the encrypted tokens (e.g. original string: 12/15/1985; encrypted token: 67L2W3y/IhclPw). The token-manager command line tool can be used to generate encrypted passwords. Access to the token-manager tool should be controlled as it can also be used to decrypt tokens and recover the original string data values.

Algorithm Characteristics

  • Algorithm: Token
  • Masking Technique: Encryption
  • Supported Types: String
  • Referential Integrity: true
  • Conflict-free: true
  • Realistic Data: false
  • Reversible: true

Properties

  • cipher { enum; optional; default: "AES_CFB8" }
    The encryption cipher used to encrypt the plaintext data and generate a token. One of AES_CFB8, RC4, or AES_CFB128. Example: "cipher": "AES_CFB8"

  • cipherPassword { string; required }
    The encrypted password used to generate tokens. The cipherPassword is decrypted and the plaintext password is used to encrypt data into tokens. Example: "maskExchange": "AES_CFB8"

Example JSON configuration

{
"name": "ExampleTokenMasker",
"description": "Reverisble tokenizer masks string data transforming into tokens",
"algorithm": "Token",
"cipher": "AES_CFB8",
"cipherPassword": "2C3r5t2L7DmhaOeozXGh"
}

Default Maskers based on the Token Algorithm

-NONE-
Since each token masker should use a unique password to protect the data, and providing a default token masker would necessitate using a known password, a default Token masker would be unsecure.