Authored by Anton Akhmerov

Pseudonymization of student numbers

The protocol consists of two steps:

  1. I generate a secure random key, and I store the key encrypted with my personal PGP key
  2. Whenever I encounter a student number, I replace it with the first characters of a cryptographic hash of that student number using the key as salt.

License: Public domain.

Edited 1.98 KB
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment