Replace sensitive data with cryptographically secure, format-identical tokens — no schema changes, no broken validations, no regex rewrites. Built on FF3-1 / AES (NIST SP 800-38G Rev 1).
curl -X POST http://localhost:8000/tokenize \ -H "Content-Type: application/json" \ -H "X-API-Key: $API_KEY" \ -d '{ "plaintext": "13301430-6", "encoding": "numeric" }' # Response { "token": "35240589-5", "algorithm": "FF3-1/AES", "encoding": "numeric" }
What is it
AgileTrust Tokenization replaces names, IDs, and numeric identifiers with cryptographically secure tokens that look exactly like the original data. A Chilean RUT 13301430-6 becomes 35240589-5 — same format, different value, fully reversible with the key.
No schema migrations. No regex changes. No downstream breakage.
How it works →curl -X POST http://localhost:8000/tokenize \
-H "Content-Type: application/json" \
-d '{
"plaintext": "13301430-6",
"encoding": "numeric"
}'
# Response
{
"token": "35240589-5",
"algorithm": "FF3-1/AES",
"encoding": "numeric"
}
Encoding Modes
Pick the encoding that matches your data type. The same plaintext tokenized with different encodings produces completely different tokens.
Digits in, digits out. Hyphens, spaces and brackets are preserved.
~256 Unicode letters + digits. Covers names from Latin, Greek, IPA and more.
~127 Latin-1 chars. Tokens stay within U+00FF — safe for legacy Latin-1 systems.
Features
Built on the NIST SP 800-38G Rev 1 standard. AES-128, 192, or 256. Cryptographically proven pseudorandom permutation.
Token length equals input length. Symbols, spaces, hyphens and punctuation pass through unchanged at their original positions.
Detokenize recovers the original value exactly — provided the same key, encoding, and tweak are used.
Field-level context via the optional tweak parameter. Same value, different field → different token. Prevents cross-field correlation.
Run single-tenant (one key, one app) or multi-tenant with the Next.js admin console: SSO login, per-app keys, RBAC, audit log, and 8 key vault providers.
Plaintext values, tokens, and key material are never written to logs. Only operation type, encoding, and input length are recorded.
Quick Start
Deployment
Run anywhere Docker runs — local, ECS, Kubernetes, Fly.io. AES key injected via TOKENIZATION_KEY environment variable at startup.
Zero-infra deployment via AWS SAM. Key supplied per-request — either raw base64 (client mode) or KMS-encrypted (HSM-backed).
Pricing
Start free, scale when you need to. All plans include the full FF3-1 / AES-256 tokenization API.
Free Tier
Perfect for prototypes and personal projects.
Startup
Great for growing teams that need more throughput and flexibility.
Enterprise
Unlimited operations, HSM-backed keys, SLA, and dedicated support.
Compatibility
Any language that can make HTTP POST requests works with AgileTrust Tokenization. See the client examples →