Protection Method Reference

A general overview of protection methods supported by Protegrity products. It guides you through Protegrity protection methods, providing a comparison of all the protection methods.

Protegrity products can protect sensitive data with the following protection methods:

The following table describes the protection methods for structured and unstructured data security policy types.

Table: Protection Methods by Data Security Policy Type

Protection MethodDescriptionStructuredUnstructured
Tokenization (all types)Tokenization is the process of replacing sensitive data with tokens that has no worth to someone who gains unauthorized access to the data. 
Format Preserving Encryption (FPE)A data encryption technique that preserves the ciphertext format using FF1 mode of operation for AES-256 block cipher algorithm. 
AES-128A block cipher with 128 bit encryption keys.
AES-256A block cipher with 256 bit encryption keys.
CUSP AES-128,
CUSP AES-256
A modified block algorithm mainly used in environments where an IBM mainframe is present. 
No EncryptionIt does not protect data but lets the sensitive data be stored in clear. Protection comes from access control, monitoring, and masking. 
MonitoringIt does not protect data but is used for monitoring and auditing. 
MaskingIt does not protect the data but applies masking to the sensitive data. 
Hashing (HMAC-SHA256)A Keyed-Hash Message Authentication Code. It is used only for protection of data using hashing. Since hashing is a one-way function, the original data cannot be restored. 

The following table describes the deprecated protection methods for structured and unstructured data security policy types.

Table: Deprecated Protection Methods by Data Security Policy Type

Protection MethodDescriptionStructuredUnstructured
3DESA block cipher with 168 bit encryption keys.
CUSP 3DESA modified block algorithm mainly used in environments where an IBM mainframe is present. 
Hashing (HMAC-SHA1)A Keyed-Hash Message Authentication Code. It is used only for protection of data using hashing. Since hashing is a one-way function, the original data cannot be restored. 

Protegrity protection methods, including tokenization, encryption, monitoring, masking, and hashing, support various input formats. This enables you to protect sensitive data using these methods. Some examples of input formats are as follows:

  • Social Security Numbers (SSNs)
  • Credit Card Numbers (CCNs)
  • Electronic Personal Health Information (ePHI), which is controlled by Health Insurance Portability and Accountability Act (HIPPA) and Health Information Technology for Economic and Clinical Health (HITECH)
  • Personally identifiable information (PII)

The following table shows different types of sensitive data that can be protected using different protection methods. It demonstrates input values and their corresponding protected values.

Table: Examples of Protected Data

#Type of DataInputProtected ValueComments on Protected Value
1SSN delimiters075-67-2278287-38-2567Numeric token, delimiters in input
2Credit Card5511 3092 3993 49758278 2789 2990 2789Numeric token
3Credit Card5511 3092 3993 49758278 2789 2990 4975Numeric token, last 4 digits in clear
4Credit Card5511309239934975551130##########No Encryption with mask exposing the first 6 digits. A mask is applied by the data security policy when a user tries to unprotect the protected value.
5Credit Card55113092399349751437623387940746Credit Card token with invalid Luhn digit property. Tokenized value has invalid Luhn checksum.
6Credit Card55113092399349758313123036143103Credit Card token with invalid card type identification. The first digit in tokenized value is not a valid card type.
7Credit Card55113092399349751854817J97347370Credit Card token with alphabetic indicator on the 8th position.
8Phone/Fax number1 888 397 81929 853 888 8435Numeric token
9Medical ID29M2009IDiA6wx0Mw1Alpha-Numeric token
10Date and Time2012.12.31 12:23:341816.07.22 14:31:51Datetime token, date and time parts are tokenized
11Proper namesAlfred HitchcockuRLzbg cvofdBFJhAlpha token
12Short namesAlkKXAlpha token non-length preserving
13AbbreviationsCXRGTPUpper-case Alpha token
14License plates583-LBE44J-KLTUpper Alpha-Numeric token
15Addresses5 High Ridge Park, Stamford5 hcY2 k9rLp Z0uA, KunZYNEMAlpha-Numeric token. Punctuation marks and spaces are treated as delimiters.
16E-mail AddressProtegrity1234@gmail.comtzJkXJDRwjcNLU@02ici.comAlpha-Numeric token, delimiters in input, last 3 characters in clear
17E-mail AddressProtegrity1234@gmail.comUNfOxcZ51jWbXMq@gmail.comEmail token
18Password2$trongPa$$]tlÙÖ­ëÍÈÃWUnicode Gen2 token with alphabet:
Printable (U+20-U+7E, U+A0-U+FF)
19Fuzzy times1994-01-01_00.00.00wfÏÛöò·×ÚøÕuðÔt´þà8Unicode Gen2 token with alphabet:
Printable (U+20-U+7E, U+A0-U+FF)
20Unicode textýç"ö÷ÓǶf$ùIUnicode Gen2 token with alphabet:
Printable (U+20-U+7E, U+A0-U+FF)
21Unicode textПротегритиЧцдяайыбмUnicode Gen2 token with alphabet:
Cyrillic (U+410-U+44F)
22Japanese textデータ保護睯窯闒懻辶Unicode Gen2 token with alphabet:
Numeric (U+0030-U+0039)
Hiragana (U+3041-U+3096)
Katakana (U+30A0-U+30FF)
Kanji (U+4E00-U+9FFF)
23Japanese address〒106-0044東京都港区東麻布1-8-1 東麻布ISビル4F〒门醆湏-鑹晓侐晊秦龡箳蕛矱蝠苲四猿-蠵-堻 鞄眡莧IS閲楌蹬FUnicode Gen2 token with alphabet:
Numeric (U+0030-U+0039)
Hiragana (U+3041-U+3096)
Katakana (U+30A0-U+30FF)
Kanji (U+4E00-U+9FFF)
24Financial data-3015.039-4416.646Decimal token. Protected value will never contain any zeroes.
25Photographic images, media filesMedia stored as BLOB typeEncrypted BLOBEncryption (AES-256, AES-128) or hashing (HMAC-SHA256)
26Irreversible data to be destroyedAnyDataTo DestroyQ2LKa2UhIhMTiRsi0l8BUF5xVag=Hashing (HMAC-SHA256), data cannot be decrypted

You can combine Protegrity protection methods to obtain the required level of data access control within the enterprise.

For example, a Security Officer can use a data security policy to control what is delivered to different roles in the policy. The following figure shows how Social Security Number access can vary by different users and applications.

SSN Access

In the figure, the tokenized SSN is stored in the database. However, there are four roles defined in the policy:

Table: Different Roles in the Policy

Users and RolesDescription
Authorized users - RealIt is the original or real value. A user with unprotect rights.
Privileged users - No AccessIt is the default configuration. If the user does not have protect access rights, a null value is returned.
Commercial off-the-shelf (COTS) application users - TokenIf the user does not have unprotect rights but the configuration is set as protect, then the configuration allows the output section to be protected.
Homegrown application users - MaskedIt is how the masking data element is configured and the users are granted view access. For more information about masking, refer to Masking.

Each role can receive a different form of the SSN based on its need. The Security Officer determines the SSN form by role.
Protegrity tokenization maintains a separation of duties by way of the data security policy.
The DBA, Developers, and System Administrators do not have direct access to the data. Everything goes through the data security policy, regardless of who manages the system.
For more information about data security policies, refer to Managing policies.


Protegrity Tokenization

Protegrity tokenization is a method for tokenizing data. It is optimized to meet the performance, scalability, and manageability requirements of large and complex environments.

Protegrity Format Preserving Encryption

The Protegrity Format Preserving Encryption (FPE) encrypts input data of a specified format and generates output data, ciphertext, of the same format.

Protegrity Encryption

Encryption is the conversion of data into a ciphertext using an algorithmic scheme.

No Encryption

The No Encryption protection method uses the data security policy to access the clear data.

Monitoring

The Monitor protection method is generally used for auditing.

Masking

The Masking method is generally used where data output restrictions must be applied for users.

Hashing

Hashing is an alternative method for protecting sensitive data.

ASCII Character Codes

ASCII is a 7-bit character set. It consists of 128 characters which includes numbers from 0-9, upper and lower case alphabets (A-Z, a-z), and special characters.

Examples of Column Sized Calculation for AES and 3DES Encryption

The section provides examples of Column Sized Calculation for AES and 3DES Encryption.

Empty String Handling by Protectors

Empty strings can be protected by tokenization and encryption.

Hashing Functions and Examples

Hashing functions take the same parameters and return a hash value.

Codebook Re-shuffling in the Data Security Gateway

The Codebook Re-shuffling in DSG generates unique tokens for protected values for all the tokenization data elements.


Last modified : January 20, 2026