Discussion of Post-Quantum Cryptography and other technologies:
Data Security Techniques
Secure Multi-Party Computation (SMPC)
Homomorphic encryption (HE)
Differential Privacy (DP) and K-Anonymity
Pseudonymization and Anonymization
Synthetic Data
Zero trust architecture (ZTA)
Zero-knowledge proofs (ZKP)
Private Set Intersection (PSI)
Trusted execution environments (TEE)
Post-Quantum Cryptography
Blockchain
Regulations and Standards in Data Privacy
13. 10 000 000 -
1 000 000 -
100 000 -
10 000 -
1 000 -
100 -
Transactions per second*
I
Format
Preserving
Encryption
(FPE)
Examples of Speed for Different Data Protection Techniques
I
Vaultless
Data
Tokenization
I
AES CBC
Encryption
Standard
I
Vault-based
Data
Tokenization
*: Speed will depend on the configuration
AWS Cloud
example:
20 million/s
Teradata
example:
10 million/s
Example of
one FPE
encryption
implements
10 rounds of
AES
Example of Vaultless Tokenization
performance is comparable to AES
Linus on Intel® Xeon®
Processor E5 Family
example:
200 k/s
Example of 1
k/s with a
centralized
Token Vault
on Oracle