Encryption (English: encryption)

Unlike hash functions, encryption is a two-way process – data can be both encrypted and decrypted using an encryption key (password, code). This process is also based on mathematical algorithms that systematically transform the original data. This method can be used for both simple and complex data structures. Encryption provides better security than a simple key table if the encryption key is properly protected.
With the encryption method, there is no need to keep a key table or a table of original values. However, the encryption key must be stored in a particularly secure way and only the researcher who needs to know the real identities of the individuals (e.g. the Principal Investigator) is aware of this.

Example

Step by step encryption process:
  1. Initially, choose an encryption algorithm (e.g. AES, which can be used with programming tools such as R, Python, etc.)
  2. Create a secure encryption key (e.g. password “UniversityResearch2025”)
  3. Encrypts the identifier with the selected key
  4. Replaces the original identifier with the encrypted version
  5. Securely store the decryption key
Original data:
Name, surname Faculty Level of physical activity
John Berzins Computer Science Low
Līga Ozola Medical Medium
Karlis Priedītis Social Sciences Medium
Pseudonymised dataset using AES encryption algorithm and key "UniversityResearch2025":
AES-encrypted Faculty Level of physical activity
fR7y2pL9xQ3zT8vW1sK4jH6gD0 Computer Science Low
nT5wX3kL8zB1qV9eM7sY2cR4aJ Medical Medium
hP4mZ7uD2xN6tV1oQ9rK3bL8yS Social sciences Medium

Encryption (English: encryption)

Unlike hash functions, encryption is a two-way process – data can be both encrypted and decrypted using an encryption key (password, code). This process is also based on mathematical algorithms that systematically transform the original data. This method can be used for both simple and complex data structures. Encryption provides better security than a simple key table if the encryption key is properly protected.
With the encryption method, there is no need to keep a key table or a table of original values. However, the encryption key must be stored in a particularly secure way and only the researcher who needs to know the real identities of the individuals (e.g. the Principal Investigator) is aware of this.

Example

Step by step encryption process:
  1. Initially, choose an encryption algorithm (e.g. AES, which can be used with programming tools such as R, Python u. c.)
  2. Create a secure encryption key (e.g. password “UniversityResearch2025”)
  3. Encrypts the identifier with the selected key
  4. Replaces the original identifier with the encrypted version
  5. Securely store the decryption key
Original data:
Name, surname Faculty Level of physical activity
John Berzins Computer Science Low
Līga Ozola Medical Medium
Karlis Priedītis Social Sciences Medium
Pseudonymised dataset using AES encryption algorithm and key "UniversityResearch2025":
AES-encrypted Faculty Level of physical activity
fR7y2pL9xQ3zT8vW1sK4jH6gD0 Computer Science Low
nT5wX3kL8zB1qV9eM7sY2cR4aJ Medical Medium
hP4mZ7uD2xN6tV1oQ9rK3bL8yS Social sciences Medium