Encryption vs. tokenization: How they’re different and how they work together

Payments
Payments

成長中のスタートアップからグローバル企業まで、あらゆるビジネスに対応できる決済ソリューションを利用して、オンライン決済、対面支払いなど、世界中のあらゆる場所で決済を受け付けます。

もっと知る 
  1. はじめに
  2. How does encryption work?
  3. What is encryption used for?
  4. How does tokenization work?
  5. What is tokenization used for?
  6. Tokenization vs. encryption: Key differences and how they work together
    1. An example of using tokenization and encryption together
  7. Best practices for using encryption and tokenization in your business
    1. Encryption
    2. Tokenization
    3. Combining encryption and tokenization

Encryption and tokenization are both data security techniques. Encryption scrambles sensitive data, making it unreadable without a decryption key. Tokenization replaces sensitive data with a nonsensitive substitute (a token), which has no value on its own. The growth of online and digital payments has led to a rise in these security methods, with the volume of tokenized payment transactions projected to surpass one trillion globally by 2026.

Below, we’ll unpack the differences between encryption and tokenization, including how both work, how they’re used, and what businesses need to know about using them together to keep payments systems secure.

What’s in this article?

  • How does encryption work?
  • What is encryption used for?
  • How does tokenization work?
  • What is tokenization used for?
  • Tokenization vs. encryption: Key differences and how they work together
  • Best practices for using encryption and tokenization in your business

How does encryption work?

Encryption transforms plaintext, the readable form of data, into ciphertext, an unreadable format. It transforms data by using a cryptographic algorithm (a set of mathematical rules that dictate how the data is scrambled) and a key (a piece of information, like a password, that’s used by the algorithm to encrypt and decrypt the data).

Here’s a simplified example of how it works:

  • Plaintext: “Hello”

  • Key: “Secret”

  • Algorithm: Caesar cipher (shifts each letter in the alphabet by a certain number of places)

  • Encryption: The algorithm, using the key “Secret,” shifts each letter in “Hello” by three places, resulting in the ciphertext “Khoor.”

Only someone with the correct key (“Secret”) and knowledge of the algorithm (Caesar cipher) would be able to decrypt the ciphertext back into the original plaintext.

There are many different types of encryption algorithms, each with varying levels of complexity and security. Some commonly used algorithms include Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA).

The encryption’s strength depends on several factors, including the algorithm used, the key’s length and complexity, and the security of the systems for storing and transmitting encrypted data.

What is encryption used for?

Encryption protects sensitive information. Here are some of the most common applications:

  • Communication: Encryption protects data transmitted over networks—like emails, messages, and online transactions—so that only authorized parties can access the information, preventing eavesdropping and tampering.

  • Data storage: Encryption protects data stored on devices and servers, making it unreadable to unauthorized individuals. This is important for sensitive information, such as personal data, financial records, and confidential business documents.

  • Password protection: Encryption stores and protects passwords. Instead of storing passwords in plaintext, encryption converts them into encrypted hashes. This makes it difficult for hackers to recover the passwords, even if they gain access.

  • File transfer: Encryption keeps data confidential when someone transfers files over the internet or other networks, protecting sensitive information such as intellectual property, medical records, and financial data.

  • Financial transactions: Encryption keeps financial transactions in online banking and payment systems confidential, protecting sensitive information like credit card numbers and bank account details.

  • Virtual private networks (VPNs): VPNs use encryption to create secure connections over public networks, allowing users to securely and privately access resources. Businesses often use VPNs to protect sensitive data transmitted between offices and remote employees.

  • Digital rights management (DRM): DRM systems use encryption to control access to copyrighted material like software, music, and videos. This prevents unauthorized copying or distribution.

  • Browsing: Hypertext Transfer Protocol Secure (HTTPS) uses encryption to protect website traffic, keeping data transmitted between the user’s browser and the website server confidential.

  • Messaging apps: Many messaging apps use end-to-end encryption so that only the sender and intended recipient can read the messages. This provides a high level of privacy and security for sensitive communications.

How does tokenization work?

Tokenization substitutes sensitive data—such as a credit card number, social security number, and any other confidential information—with a nonsensitive, randomly generated equivalent called a token. This token is a string of characters that has no inherent value or meaning. Even if a token is compromised, it is useless to an attacker because it does not contain sensitive information. There are numerous uses for tokens, making them a versatile tool for protecting sensitive data.

Tokenization systems manage the tokens and their relationship with the original data. These systems store the original sensitive data in a highly secure environment; this is often referred to as a token vault, which is isolated and protected from unauthorized access. The system will then use the token instead of the original data when completing processes like transactions. In some cases, the system can retrieve the original sensitive data from the token vault using a process called detokenization, but it typically does so only when absolutely necessary and under strict security controls. Tokens are irreversible by design, meaning they cannot be used to derive the original sensitive data without access to the token vault.

What is tokenization used for?

Tokenization keeps sensitive data secure and private in a wide range of industries and applications. Here are some common use cases:

  • Payment Card Industry Data Security Standard (PCI DSS): Tokenization protects credit card data. It helps merchants and payment processors comply with PCI DSS regulations by reducing the risk of data breaches and fraud.

  • Ecommerce: Tokenization secures online transactions, protecting customer payment information during processing and storage. This helps protect both businesses and customers from financial losses due to unauthorized access to card data.

  • Healthcare: Tokenization protects patient health information (PHI) by replacing sensitive data elements like Social Security numbers or medical ID numbers with tokens. This helps healthcare providers comply with Health Insurance Portability and Accountability Act (HIPAA) regulations and protect patients’ privacy.

  • Financial services: Financial applications like mobile payments, peer-to-peer transactions, and account linking use tokenization to protect sensitive financial data from unauthorized access and fraud.

  • Loyalty programs: Tokenization secures data from customer loyalty programs, including rewards points or membership numbers, to protect customers’ information and prevent misuse.

  • Data storage: Tokenization protects sensitive data stored in databases or the cloud, reducing the risk of data breaches and keeping information confidential.

  • Government and public sector: Tokenization protects sensitive government and public sector data like identification information, tax records, and Social Security numbers.

Tokenization vs. encryption: Key differences and how they work together

Tokenization and encryption are complementary data security techniques that are often used together. Encryption transforms plaintext data into an unreadable format (ciphertext) using a cryptographic algorithm and a key. Tokenization substitutes sensitive data with a surrogate value known as a token, which has no intrinsic value or meaning and bears no mathematical relationship to the original data.

Here’s some of their distinctions and functional overlap:

技術
暗号化
トークン化
可逆性 正しいキーを使って元に戻すことができます トークンボールトにアクセスできないと、元に戻すことができません
データ形式 元のデータ構造を変えます 元のデータ形式が維持されます
セキュリティを重視 保存中および送信中のデータを保護します 主に保存中のデータを保護します
規制遵守 規制遵守要件に従うように促進しますが、機密データは完全には分離されません 環境から機密データを除去することで、規制遵守を促進します
ユースケース 元の形式で読み取って処理をする必要があるデータに適しています 参照する必要があるが、公開する必要がないデータに適しています

Tokenization and encryption together can create a layered security approach. Here’s a closer look at how they work together:

  • Tokenization for storage: A user tokenizes sensitive data and stores it in a database.

  • Encryption for transmission: When tokens need to be transmitted for purposes like payment processing, the user can encrypt them for secure communication.

  • Detokenization (if necessary): In specific scenarios that require access to the original data, authorized parties can use the token vault to detokenize the data under strict security protocols.

An example of using tokenization and encryption together

A retailer is storing customer credit card information. Instead of storing the actual card numbers, they use tokenization to replace them with tokens. The retailer uses the tokens for transactions, while the actual card numbers are securely stored in a token vault and encrypted for additional protection.

Best practices for using encryption and tokenization in your business

Encryption and tokenization are important components of a robust data security system. Here are some best practices for implementing effective, compliant security standards:

  • Compliance: Understand the relevant data protection regulations in your industry (e.g., PCI DSS, HIPAA, General Data Protection Regulation [GDPR]) to ensure your encryption and tokenization practices are in compliance.

  • Security audits: Regularly review and audit your encryption and tokenization processes to identify potential weaknesses and vulnerabilities.

  • Employee training: Educate your employees on the importance of data security and the proper handling of sensitive information.

  • Incident response plan: Plan a quick, effective response to possible security breaches.

Encryption

Here are some best practices for using encryption:

  • Use industry-standard algorithms like AES with appropriate key lengths (e.g., AES-256). Avoid outdated or weak algorithms.

  • Protect your encryption keys. Store them securely, tightly control access, and regularly rotate them. Consider using a Hardware Security Module (HSM) for even more protection.

  • Encrypt sensitive data when it’s stored on your servers, in the cloud, and when it’s transmitted over networks.

  • Use secure protocols such as Transport Layer Security (TLS) to encrypt communication channels to keep data transmitted between systems confidential.

Tokenization

Here are some best practices for using tokenization:

  • Prioritize tokenization for highly sensitive data such as credit card numbers, Social Security numbers, and any personally identifiable information (PII).

  • Store the original data and its relationship to the tokens in a secure token vault, separate from your production environment. Implement strong access controls and monitoring for the vault.

  • Consider format-preserving tokenization (FPT) to maintain the original format of the data to simplify integration with existing systems and applications.

  • Develop a clear policy for generating, using, and retiring tokens to ensure they are used appropriately and don’t become stale or vulnerable.

Combining encryption and tokenization

Here are some best practices for combining encryption and tokenization in your security system:

  • Combine the strengths of both techniques for greater security. Encrypt tokenized data to further protect it during transmission.

  • Use tokenization for the most sensitive data and encrypt other sensitive information to balance security with performance and usability.

  • Evaluate the risk associated with different types of data and apply appropriate protection measures accordingly. Not all types of data need the same level of security.

この記事の内容は、一般的な情報および教育のみを目的としており、法律上または税務上のアドバイスとして解釈されるべきではありません。Stripe は、記事内の情報の正確性、完全性、妥当性、または最新性を保証または請け合うものではありません。特定の状況については、管轄区域で活動する資格のある有能な弁護士または会計士に助言を求める必要があります。

今すぐ始めましょう

アカウントを作成し、支払いの受け付けを開始しましょう。契約や、銀行情報の提出などの手続きは不要です。貴社ビジネスに合わせたカスタムパッケージのご提案については、営業担当にお問い合わせください。
Payments

Payments

あらゆるビジネスに対応できる決済ソリューションを利用して、世界中のあらゆる場所でオンライン決済と対面決済を受け付けましょう。

Payments のドキュメント

Stripe の支払い API の導入方法について、ガイドをご覧ください。