DEVELOPER

Back to Developer Blog

business

Encryption vs. Tokenization — Choosing the Best Defense for Payment Security

By Dave Galens | July 30th, 2024


As the payment world becomes more intricate and diverse, those who prey upon it — fraudsters, scammers, and phishers — continue to up their game. Yet as deviously creative as cybercrime has become, modern data security has also evolved in sophisticated ways.

As a developer working with business owners to create payment systems, understanding these security measures — and data protection in general — can be a tremendous asset.

Two key ways we protect payments are encryption and tokenization. They share some similarities — and both offer robust protection — but each also has its nuances.

What Is Encryption?

Encryption transforms plain text into encoded information. In payments, it is the process of taking sensitive information and converting it into code. Credit, debit, and ACH numbers become ciphertext that requires a specific corresponding decryption key to convert back into usable payment information. There are two main types of encryption.
  • Symmetric in which both encryption and decryption use the same key. It’s the faster of the two methods but is more prone to risk.
  • Asymmetric uses two different keys: A public key that can be shared for encryption; and a private key that is held by authorized parties for decryption.

Encryption occurs when a customer initiates a transaction. The encoded information is protected as it travels from the owner to a payment server. Encrypted data can also be stored on ecommerce sites for recurring payments. If a fraudster gets ahold of this information, it’s unusable to them — unless they obtain the key.

Encryption is a compliance requirement that is part of the Payment Card Industry Data Security Standard (PCI DSS) to protect customer information. While compliance with this standard is not law, most payment partners take on this burden to help merchants maintain business as usual and avoid sanctions.

Most North Developer integrations are PCI Level-3-certified right off the shelf and reduce PCI scope for ISVs For example, our North SI Cloud API encrypts cardholder data and prevents sensitive cardholder information from ever reaching ISV or merchant servers. Only API integrations that allow sensitive data into your server environment are within PCI scope. We also offer available Point-to-Point Encryption that eliminates clear-text cardholder data from the payment transmission process.

What is tokenization and how does it work?

Tokens are randomly generated strings of characters or symbols that take the place of sensitive data like card or account information. They can’t be reconverted or reverse engineered. And if they’re lost or stolen, the value and information they represent is not lost.

Custom tokens also allow you to securely link to transactions for additional functionality, including reporting, chargebacks, recurring sales, and even to create other transactions. Risk is minimized because credit, debit, and ACH account numbers are not being stored by the merchant or ISV — tokens are. Tokens can be used for recurring purchases, acting upon a previous transaction such as capturing an authorization by using the authorization token in the capture request. They can also be used to refund a sale by using the sale token in the refund request.

Token Types

There are different types of tokens. Here’s a quick rundown of the commonly used ones.

Network Tokens

Network tokens are unique digital identifiers used to supply symbolic placeholder data instead of the primary account number (PAN) in all parts of the payment chain. Network tokens are generated automatically and in real-time by the card schemes as customers use their cards. For example, when they're checking out on an ecommerce website or paying using a pass-through digital wallet, such as Apple Pay or Google Pay.

Storage Tokens

Storage tokens convert existing account numbers (credit, debit, ACH), allowing them to be used for long-term recurring transactions — without the risk and expense of storing the actual numbers. Once stored, these tokens can be used for subsequent transactions, and they don’t expire.

Financial Tokens

Financial tokens are generated for each financial transaction submitted, such as an authorization or settlement. Each new transaction generates a new token that’s good for 13 months.

Acquirer Tokens

Acquirer tokens are generated by acquirers who process cardholder transaction requests on behalf of merchants. Acquirers generate them, own them, and are the only ones who can use them.

Issuer Tokens

Issuer tokens are generated by card issuers, typically for mobile pay applications such as Apple Pay or Google Pay. These tokens go to a cardholder’s mobile app, card chip, or wallet applications.

Merchant Tokens

Merchant tokens are generated specifically for a merchant by their provider. These tokens are generated after a cardholder tenders their card for transaction processing.
Payments Hub custom BRIC tokens allow you to link transactions for reporting, chargebacks, and recurring sales (you can also find API solutions for reporting and recurring billing on our portal). BRIC tokens can also be used to create other transactions without the risk and expense of storing card and ACH account data. BRICs are commonly used to act upon a previous transaction. An existing authorization can be captured or an existing transaction can be refunded. BRICs can also be used to create recurring payments.

Encryption vs. Tokenization

Encryption and tokenization each have their strengths and shortcomings. Looking at where they excel — and don’t do so well — may help in deciding when and where to use them.
Encrypted payment

Encryption

  • Encryption is versatile — it can secure both structured data such as account information and unstructured data such as entire files.
  • Encryption can be used on a wide variety of applications. When a database increases in size — or servers are in use — encryption can scale easily, making it ideal for these data security applications.
  • The process can be time-consuming, if speed is a factor, encryption has limitations.
  • While encrypted ciphertext is secure and unintelligible without the proper key, if the encryption is stolen, the thieves have that data. If they can locate the right key, the payment information can be decrypted and used.

Tokenization

  • Sensitive data can only be retrieved with the correct token when an authorized request is made. This process is often used alongside encryption, protecting sensitive transaction information from any unauthorized eyes during the transfer.
  • Tokens can minimize the risk of data loss for merchants and ISVs since the data is not stored in a database maintained by the merchants or software providers — only the tokens are. This protects the information from falling into criminal hands, unlike stolen encrypted data, which can be obtained (though not necessarily decrypted).
  • Tokens aid in compliance with PCI DSS, an industry obligation for businesses with whom you implement payment processing.
  • Tokens are not-so-scalable. If you’re dealing with large volumes of data, a great number of tokens are needed, which can make the process cumbersome.

What should I use when processing payments?

Choosing to use encryption, tokenization, or a mix of the two depends on the nature of the business you’re working with, as well as the specific information requirements of your payment application.

Here are some additional considerations:

  • Tokenization offers robust security with fewer vulnerabilities. If you’re working with large data sets — more than just account numbers or shorter form information — encryption may be the better option.
  • Consider how long the sensitive data will be stored. If you’re building payments for recurring purchases, to be kept in online store accounts, or subscription-based sales, tokenization will offer enhanced security in the long run.
  • Encryption keys are a strong tool for protecting information, but if management of said key is a concern, if there’s any chance its ownership could be compromised, tokenization's keyless qualities may be the better — less burdensome — choice.
  • It may come down to cost effectiveness: Consider how data is transmitted, the way service providers may prefer to receive sensitive data. Many offer lower fees depending on whether encryption or network tokens are used.

How To Get Started

Here on Payments Hub, we offer the latest in payments security measures, giving you a considerable advantage when it comes to developing data protection. All of our systems communicate seamlessly with our in-house processor, meaning merchant and customer data flow securely through internal PCI-certified, protected environments that keep information safe, every step of the way.

Our team is available to help you make the right decision for your next build.

Contact us with any questions — and if you’re ready to get started with encryption or tokenization for data security, we’re here for you, too.

Start your free Developer account and try it now.


©2025 North is a registered DBA of NorthAB, LLC. All rights reserved. North is a registered ISO of BMO Harris Bank N.A., Chicago, IL, Citizens Bank N.A., Providence, RI, The Bancorp Bank, Philadelphia, PA, FFB Bank, Fresno, CA, Wells Fargo Bank, N.A., Concord, CA, and PNC Bank, N.A.