Pseudonymization of student numbers
The protocol consists of two steps:
- I generate a secure random key, and I store the key encrypted with my personal PGP key
- Whenever I encounter a student number, I replace it with the first characters of a cryptographic hash of that student number using the key as salt.
License: Public domain.