As a developer working with business owners to create payment systems, understanding these security measures — and data protection in general — can be a tremendous asset.
Two key ways we protect payments are encryption and tokenization. They share some similarities — and both offer robust protection — but each also has its nuances.
What Is Encryption?
- Symmetric in which both encryption and decryption use the same key. It’s the faster of the two methods but is more prone to risk.
- Asymmetric uses two different keys: A public key that can be shared for encryption; and a private key that is held by authorized parties for decryption.
Encryption occurs when a customer initiates a transaction. The encoded information is protected as it travels from the owner to a payment server. Encrypted data can also be stored on ecommerce sites for recurring payments. If a fraudster gets ahold of this information, it’s unusable to them — unless they obtain the key.
Encryption is a compliance requirement that is part of the Payment Card Industry Data Security Standard (PCI DSS) to protect customer information. While compliance with this standard is not law, most payment partners take on this burden to help merchants maintain business as usual and avoid sanctions.
Most North Developer integrations are PCI Level-3-certified right off the shelf and reduce PCI scope for ISVs For example, our North SI Cloud API encrypts cardholder data and prevents sensitive cardholder information from ever reaching ISV or merchant servers. Only API integrations that allow sensitive data into your server environment are within PCI scope. We also offer available Point-to-Point Encryption that eliminates clear-text cardholder data from the payment transmission process.
What is tokenization and how does it work?
Custom tokens also allow you to securely link to transactions for additional functionality, including reporting, chargebacks, recurring sales, and even to create other transactions. Risk is minimized because credit, debit, and ACH account numbers are not being stored by the merchant or ISV — tokens are. Tokens can be used for recurring purchases, acting upon a previous transaction such as capturing an authorization by using the authorization token in the capture request. They can also be used to refund a sale by using the sale token in the refund request.
Token Types
Network Tokens
Storage Tokens
Financial Tokens
Acquirer Tokens
Issuer Tokens
Merchant Tokens
Encryption vs. Tokenization

Encryption
- Encryption is versatile — it can secure both structured data such as account information and unstructured data such as entire files.
- Encryption can be used on a wide variety of applications. When a database increases in size — or servers are in use — encryption can scale easily, making it ideal for these data security applications.
- The process can be time-consuming, if speed is a factor, encryption has limitations.
- While encrypted ciphertext is secure and unintelligible without the proper key, if the encryption is stolen, the thieves have that data. If they can locate the right key, the payment information can be decrypted and used.
Tokenization
- Sensitive data can only be retrieved with the correct token when an authorized request is made. This process is often used alongside encryption, protecting sensitive transaction information from any unauthorized eyes during the transfer.
- Tokens can minimize the risk of data loss for merchants and ISVs since the data is not stored in a database maintained by the merchants or software providers — only the tokens are. This protects the information from falling into criminal hands, unlike stolen encrypted data, which can be obtained (though not necessarily decrypted).
- Tokens aid in compliance with PCI DSS, an industry obligation for businesses with whom you implement payment processing.
- Tokens are not-so-scalable. If you’re dealing with large volumes of data, a great number of tokens are needed, which can make the process cumbersome.
What should I use when processing payments?
Here are some additional considerations:
- Tokenization offers robust security with fewer vulnerabilities. If you’re working with large data sets — more than just account numbers or shorter form information — encryption may be the better option.
- Consider how long the sensitive data will be stored. If you’re building payments for recurring purchases, to be kept in online store accounts, or subscription-based sales, tokenization will offer enhanced security in the long run.
- Encryption keys are a strong tool for protecting information, but if management of said key is a concern, if there’s any chance its ownership could be compromised, tokenization's keyless qualities may be the better — less burdensome — choice.
- It may come down to cost effectiveness: Consider how data is transmitted, the way service providers may prefer to receive sensitive data. Many offer lower fees depending on whether encryption or network tokens are used.
How To Get Started
Here on Payments Hub, we offer the latest in payments security measures, giving you a considerable advantage when it comes to developing data protection. All of our systems communicate seamlessly with our in-house processor, meaning merchant and customer data flow securely through internal PCI-certified, protected environments that keep information safe, every step of the way.
Our team is available to help you make the right decision for your next build.
Contact us with any questions — and if you’re ready to get started with encryption or tokenization for data security, we’re here for you, too.