No Encryption

The No Encryption protection method uses the data security policy to access the clear data.

The No Encryption protection method when applied lets sensitive data be stored in the clear. It is highly transparent, which means that the implementation of this method does not cause any changes in the target environment.

If you are reprotecting data using the No Encryption method, then the reprotect operation fails in the following scenarios:

  • If the data was previously protected using a tokenization or encryption method.
  • If the user performing the reprotection of data does not have the unprotect privileges on the data element that was used to protect the data.

Table: No Encryption Algorithm Properties

PropertiesValues
NameNo Encryption
Operation ModeN/A
Length PreservationYes
Minimum LengthNone
Maximum Length≥500 bytes
Specifics of algorithmDoes not protect data at rest by changing it.

The following table shows examples of the way in which a value will be protected with the No Encryption algorithm.

Table: Output Values for No Encryption Algorithm

Protection MethodInput ValueOutput ValueComments
No EncryptionProtegrityProtegrityThe value is stored in the clear.

No Encryption for Protectors

The Input type / Character set for all protectors vary across DBs. The Output type / Character set is the same as the input type. For example; if the input type is an integer, then the output type is also an integer.

Application Protector

Table: Input Data Types Supported by Application Protectors

Protection MethodAP Java*1AP Python
NoEncryptionSHORT

INT

LONG

FLOAT

DOUBLE

STRING

CHAR[]

BYTE[]
STRING

BYTES

FLOAT

INT

*1 - If the input and output types of the API are BYTE [], the customer application should convert the input to a byte array. Then, call the API and convert the output from the byte array.

For more information about Application protectors, refer to Application Protector.

Big Data Protector

Table: Input Data Types Supported by Big Data Protectors

Protection Method*1MapReduceHivePigHBaseImpalaSparkSpark SQLTrino
NoEncryptionBYTE[]

INT

LONG
CHAR

STRING

FLOAT

DOUBLE

INT

BIGINT

HIVEDECIMAL
CHARARRAY

INT
BYTE[]STRING

INT

FLOAT

DOUBLE
BYTE[]

STRING

FLOAT

DOUBLE

SHORT

INT

LONG
STRING

FLOAT

DOUBLE

SHORT

INT

LONG

BIGDECIMAL*2
VARCHAR

SMALLINT

INT

BIGINT

DATE

TIMESTAMP

DOUBLE

DECIMAL

*1 - The customer application should convert the input to and output from byte array.

*2 - If decimal format data is protected by the Decimal UDFs using the No Encryption data element, then the protected data is trimmed to the scale of 18 digits.

For more information about Big Data protectors, refer to Big Data Protector.

Data Warehouse Protector

Table: Input Data Types Supported for Data Warehouse Protectors

Protection MethodTeradata
NoEncryptionVARCHAR

CHAR

INTEGER

FLOAT

DECIMAL

DATE

SMALLINT

Database Protectors

Oracle Database Protector

The supported input data types for the Oracle Database Protector are listed below.

Protection MethodSupported Input Data Types
NoEncryptionVARCHAR2
NoEncryptionCHAR
NoEncryptionNUMBER
NoEncryptionREAL
NoEncryptionFLOAT
NoEncryptionDATE
NoEncryptionRAW
NoEncryptionBLOB
NoEncryptionCLOB

Last modified : January 20, 2026