Why one retailer is migrating away from encryption to protect customer data

By , Network World |  Security, encryption, retail

For retailers, protecting customer payment-card information is critical, and encryption is the typically the way to do that today. But Crutchfield Corp, which sells electronics and other goods online and through catalogs, has decided to migrate away from encryption in favor of an alternative security technology known as tokenization in order to shield sensitive customer data.

IN THE NEWS: NASA Inspector General doubts space agency can hit mandatory computer encryption goals

MORE: World of botnet cybercrime paying pretty well these days

Guidelines for the tokenization process were spelled out last year by the PCI Security Standards Council, the reigning authority defining the network-security rules for any business handling credit and debit cards. The council's definition for use with payment cards says tokenization is "a process by which the primary account number (PAN) is replaced with a surrogate value called a token" and "de-tokenization is the reverse process of redeeming a token for its associated PAN value."

There are several vendors with tokenization technologies and Crutchfield has elected to go with the Voltage Secure Stateless Tokenization, the core of which is an appliance whose job is to convert the stored tokenized data back into readable form. It's offered as part of the Voltage SecureData Enterprise product which brings together encryption, tokenization, data masking and key management.

The advantage that Crutchfield sees in tokenization, according Alex Belgard, information security engineer there, is it eliminates the need to go through an encryption-key rotation process. "Today we have encryption in place, and we have to do key rotation annually and touch a lot of systems," Belgard says. He says one worry is the encryption keys could be stolen.

He also notes that the latest version of the Payment Card Industry (PCI) standard, which any business processing payment cards must follow, has some changes in it related to how to store an encrypted hash of a credit card that appear to add complexity to encryption use. Since tokenization is also an accepted PCI security practice to protect credit and debit cards, Crutchfield decided the time was right to shift away from encryption for PCI data and toward tokenization. The goal is to get this done in the spring timeframe before the next annual PCI assessment for Crutchfield is due.


Originally published on Network World |  Click here to read the original story.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Answers - Powered by ITworld

ITworld Answers helps you solve problems and share expertise. Ask a question or take a crack at answering the new questions below.

Ask a Question