This website does readability filtering of other pages. All styles, scripts, forms and ads are stripped. If you want your website excluded or have other feedback, use this form.

Format-Preserving Encryption Solutions in IRI FieldShield (or Voracity) | IRI, The CoSort Company

Format-Preserving Encryption (FPE)

Encrypt Data Without Changing Its Appearance

Next Steps Home » Solutions » Data Masking » Static Data Masking » Encryption » FPE + BI & Analytics + Embedded BI Report Functions Format Options Change Data Capture CDI & Segmentation Clickstream Analytics Slowly Changing Dimensions + BIRT Integration Splunk Add-On Cloud Dashboard + BI Tool Acceleration BIRT Business Objects Cognos iDashboards MicroStrategy OBIEE QlikView R Splunk Spotfire Tableau + Big Data Big Data Packaging Big Data Protection Big Data Provisioning Structured Data Semi & Unstructured Data With/out Hadoop Use Cases IoT Bootcamp + Data Governance Data Masking DCAP Data Quality Test Data Forensics RBACs Stewardship Compliance COBIT Enterprise Metadata Management Master Data Management + Data Integration Speed Your ETL Re-Platform Your ETL Build New ETL + Supercharge Your ETL DataStage ETI*Solution Informatica OWB & ODI Pentaho Talend Others + Fast & Easy IRI ETL Tools Discover Design Deploy Support Extract Transform Load Flat-File ETL ELT Cleanse Federate MDM Migrate Protect Report ETL Implementation + Data Masking DLP GDPR HIPAA PCI DSS Data Masking as a Service + Static Data Masking + Encryption Algorithms FPE • Hashing Key Management Pseudonymization Redaction Tokenization Dynamic Data Masking DCAP + De-Identification Anonymize ASCII De-ID Encode Encrypt Mask Randomize Manipulate + Data Migration + Data Type Conversion Alphabetic Date/Time Multi-Byte Numeric Endianness + File Format Conversion CLF/ELF CSV LDIF LS-RS-VS MF-ISAM MFVL Text VB Vision VSAM XML Free NextForm Lite + Database Migration Data Replication + Data Transformation Aggregate Cross-Calculate Custom Transforms Formats/Keys Lookups Match/Join Pivot/Unpivot Re-Map/Reformat Scrub/Cleanse Select/Filter Sort/Merge Substrings Type-Convert + DB Operations DB2 UDB MongoDB MySQL Oracle SQL Server Sybase Teradata + Metadata & MDM Metadata Metadata Management Master Data MDM Quality & Security Services + Sort Replacements bin/sort JCL SORT Micro Focus COBOL Natural SAS UniKix + Test Data AppDev Benchmarking Compliance DB Test Data DB Subsetting Test Files/Reports Overview Algorithms Format Preserving Encryption Hashing Key Management


The purpose of most encryption tools and techniques is to mask data and allow it to be decrypted. Unfortunately, their processes result in ciphertext that is not human readable and is often longer than the original field value.

The challenge is to retain the original format of the data in its protected state, so that it appears real, preserves referential integrity checks, and can be used for testing.

Data protection needs to take into account both internal and external threats, including those against critical database and application resources. However, many protection mechanisms require application retooling or add complexity that delays or halts deployment. Format-preserving encryption overcomes these issues. It's an exciting step toward improved, simpler data protection and compliance with regulatory requirements.

-Trent Henry, Burton Group


IRI's data masking softawre products encrypt personally identifiable information (PII) in databases and files with advanced (AES-128 and AES-256) Format-Preserving Encryption (FPE) technology. Harden your data one column (or field) at a time without altering the format or appearance of the original values.

With IRI FieldShield (for databases and flat files), IRI CellShield (for Excel), or IRI Voracity (for DBs, files, HDFS, etc.), you can apply ad hoc or global FPE functions on a rule-basis to:

  • Keep and preserve original data formats
  • Maintain referential integrity
  • Eliminate the need for multiple masking and lookup tables
  • Eliminate format changes, database, or application schema
  • Encrypt primary and foreign keys
  • Provide reversible data masking

For example, encrypt a 16-digit credit card number and display another 16-digit number in the same format:



Related Solutions

Product Links


Blog Links

Other Resources

Request More Information


Copyright © 2018 Innovative Routines International (IRI), Inc.

More Info Newsletter Live Demo Free Trial Get Quote See Previous Newsletters