(testing signal)

Tag: obfuscation

Save Sarah Connor with Data Science

Data science and data privacy are deeply interwoven, and must be carefully considered by practitioners. In comparing the Safe Harbour and Expert Determination data obfuscation approaches, Safe Harbour has been very popular among data engineers but has fundamental limitations, where Expert Determination offers important advantages.

Tokenization vs Encryption

Both are mentioned together and are effective data obfuscation technologies. But they are not the same and are not interchangeable. In some cases such as electronic payments, they are used together to secure end-to-end process.

Mathematically transforms plain text into cipher text using an encryption algorithm and a key.
Scales to larger data volumes with just the use of a small encryption key to decrypt data.
Used for structured fields as well as unstructured data such as entire files.
Ideal for exchanging sensitive data with third parties who share the key.
Format preserving encryption schemes come with a trade off of lower strength.
Original data leaves the organization but in encrypted form.

Original data leaves the organization but in encrypted form.… Read more...

Obfuscation vs Encryption

Obfuscation is similar to encryption but doesn´t require a ‘secret’ to understand. Encryption is reversible but a ‘secret’ is required to do so.

Obfuscation generally involves removing clues from information (whitespace, etc.) to make something difficult to read. It provides no real or true level of security like that of encryption.

Encryption can follow several models, one of which is the ‘secret’ method, called Private Key Encryption, where both parties have a secret. Public key encryption uses a shared one-way key to encrypt and a private recipient key to decrypt. With public key only the recipient needs to have the secret.