Encryption (English: encryption)
Unlike hash functions, encryption is a two-way process – data can be both encrypted and decrypted using an encryption key (password, code). This process is also based on mathematical algorithms that systematically transform the original data. This method can be used for both simple and complex data structures. Encryption provides better security than a simple key table if the encryption key is properly protected.
With the encryption method, there is no need to keep a key table or a table of original values. However, the encryption key must be stored in a particularly secure way and only the researcher who needs to know the real identities of the individuals (e.g. the Principal Investigator) is aware of this.
Example
Step by step encryption process:
-
Initially, choose an encryption algorithm (e.g. AES, which can be used with programming tools such as R, Python, etc.)
-
Create a secure encryption key (e.g. password “UniversityResearch2025”)
-
Encrypts the identifier with the selected key
-
Replaces the original identifier with the encrypted version
-
Securely store the decryption key
Original data:
| Name, surname | Faculty | Level of physical activity |
|---|---|---|
| John Berzins | Computer Science | Low |
| Līga Ozola | Medical | Medium |
| Karlis Priedītis | Social Sciences | Medium |
Pseudonymised dataset using AES encryption algorithm and key "UniversityResearch2025":
| AES-encrypted | Faculty | Level of physical activity |
|---|---|---|
| fR7y2pL9xQ3zT8vW1sK4jH6gD0 | Computer Science | Low |
| nT5wX3kL8zB1qV9eM7sY2cR4aJ | Medical | Medium |
| hP4mZ7uD2xN6tV1oQ9rK3bL8yS | Social sciences | Medium |
Encryption (English: encryption)
Unlike hash functions, encryption is a two-way process – data can be both encrypted and decrypted using an encryption key (password, code). This process is also based on mathematical algorithms that systematically transform the original data. This method can be used for both simple and complex data structures. Encryption provides better security than a simple key table if the encryption key is properly protected.
With the encryption method, there is no need to keep a key table or a table of original values. However, the encryption key must be stored in a particularly secure way and only the researcher who needs to know the real identities of the individuals (e.g. the Principal Investigator) is aware of this.
Example
Step by step encryption process:
-
Initially, choose an encryption algorithm (e.g. AES, which can be used with programming tools such as R, Python u. c.)
-
Create a secure encryption key (e.g. password “UniversityResearch2025”)
-
Encrypts the identifier with the selected key
-
Replaces the original identifier with the encrypted version
-
Securely store the decryption key
Original data:
| Name, surname | Faculty | Level of physical activity |
|---|---|---|
| John Berzins | Computer Science | Low |
| Līga Ozola | Medical | Medium |
| Karlis Priedītis | Social Sciences | Medium |
Pseudonymised dataset using AES encryption algorithm and key "UniversityResearch2025":
| AES-encrypted | Faculty | Level of physical activity |
|---|---|---|
| fR7y2pL9xQ3zT8vW1sK4jH6gD0 | Computer Science | Low |
| nT5wX3kL8zB1qV9eM7sY2cR4aJ | Medical | Medium |
| hP4mZ7uD2xN6tV1oQ9rK3bL8yS | Social sciences | Medium |