two components (x
1
, x
2
), where x
1
is the encrypted to-
ken and x
2
is the encrypted PAN. We additionally use
a deterministic CPA secure encryption (supportingas-
sociated data) scheme E : K × D × X → C, with key
space K , tweak (associated data) space D and mes-
sage space X . Note that it is not required that C = X ,
as the ciphertexts would only be stored in the card
vault. The tokenization scheme TKR2a described in
Figure 5 uses the objects described above.
Security of TKR2 and TKR2a. The following two
theorems specify the security of TKR2 and TKR2a.
Theorem 2. Let Ψ ∈ {TKR2, TKR2a} and A be an
adversary attacking Ψ in the IND-TKR sense. Then
there exists a RND adversary B (which uses almost
the same resources as of A) such that
Adv
ind-tkr
Ψ
(A) ≤ Adv
rnd
RN
(B)
Theorem 3. Let Ψ = TKR2a and A be an adversary
attacking Ψ in the IND-TKR-CV sense, who asks at
most q queries. Then there exist adversaries B and
B
′
(which use almost the same resources as of A) such
that
Adv
ind-tkr-cv
Ψ
(A) ≤ Adv
rnd
RN
(B)
+Adv
det-cpa
E
(B
′
) +
(2q+ 1)
2
2
s
where s is the size of the smallest element in C.
Finally it is important to note that TKR2 and
TKR2a achieve security in the IND-TKR-KEY sense,
when we instantiate RN
T
() with a true random num-
ber generator (TRNG). We can easily see this, consid-
ering that a TRNG is keyless, thus we have the prop-
erty of independencebetween the tokens and the keys.
7 CONCLUSION
We studied the problem of tokenization from a cryp-
tographic viewpoint. We proposed a syntax for the
problem and also formulated three different security
definitions. These newdefinitions may help in analyz-
ing existing tokenization systems. We also proposed
three constructions for tokenization: TKR1, TKR2 and
a TKR2a. The last two constructions are particularly
interesting, as they demonstrate that tokenization can
be achieved without the use of format preserving en-
cryption. Also we analyzed all the constructions in
light of our security definitions.
More details about instantiations of the schemes
along with their security, efficiency properties and ex-
perimental results can be found in the extended ver-
sion.
ACKNOWLEDGEMENTS
The authors acknowledge the support from CONA-
CYT project 166763.
REFERENCES
Bellare, M., Ristenpart, T., Rogaway, P., and Stegers, T.
(2009). Format-preserving encryption. In Jr., M. J. J.,
Rijmen, V., and Safavi-Naini, R., editors, Selected Ar-
eas in Cryptography, volume 5867 of Lecture Notes
in Computer Science, pages 295–312. Springer.
Brier, E., Peyrin, T., and Stern, J. (2010). BPS:
a format-preserving encryption proposal.
NIST submission. Available at http://
csrc.nist.gov/groups/ST/toolkit/BCM/documents/
proposedmodes/bps/bps-spec.pdf.
Halevi, S. and Rogaway, P. (2004). A parallelizable en-
ciphering mode. In Okamoto, T., editor, CT-RSA,
volume 2964 of Lecture Notes in Computer Science,
pages 292–304. Springer.
Hoang, V. T., Morris, B., and Rogaway, P. (2012). An en-
ciphering scheme based on a card shuffle. In Safavi-
Naini, R. and Canetti, R., editors, CRYPTO, volume
7417 of Lecture Notes in Computer Science, pages 1–
13. Springer.
Morris, B., Rogaway, P., and Stegers, T. (2009). How to en-
cipher messages on a small domain. In Halevi, S., ed-
itor, CRYPTO, volume 5677 of Lecture Notes in Com-
puter Science, pages 286–302. Springer.
PCI Security Standards Council (2008). Payment card in-
dustry data security standard version 1.2. Available at
https://www.pcisecuritystandards.org/
security
standards/pci dss.shtml.
PCI Security Standards Council (2011). Information sup-
plement: PCI DSS tokenization guidelines. Available
at https://www.pcisecuritystandards.org/documents/
Tokenization
Guidelines Info Supplement.pdf.
RSA White paper (2012). Tokenization:
What next after PCI. Available at http://
www.emc.com/collateral/white-papers/h11918-wp-
tokenization-rsa-dpm.pdf.
Securosis White Paper (2011). Tokenization guidance:
How to reduce pci compliance costs. Available at
http://gateway.elavon.com/documents/Tokenization
Guidelines White Paper.pdf.
Stefanov, E. and Shi, E. (2012). Fastprp: Fast pseudo-
random permutations for small domains. IACR Cryp-
tology ePrint Archive, 2012:254.
Voltage Security White paper (2012). Payment
security solution - processor edition. Avail-
able at http://www.voltage.com/wp-content/ up-
loads/Voltage
White Paper SecureData PaymentsPro
cessorEdition.pdf.
SECRYPT2014-InternationalConferenceonSecurityandCryptography
398