Pseudonymisation for Data Protection
In a recent compliance know how past, we already addressed the future data protection regulation. The term pseudonymization is infrequently used in this subject area. This means that individual-related data is not linked explicitly to a person, but a pseudonym.
According to Suetonius, Julius Caesar used it with a shift of three to protect messages of military significance. Cryptology textbooks cite this so-called Caesar cipher often as a canonical example of weak encryption, because it's easy to crack using a simple frequency analysis. A simple pseudonymization can hardly satify serious data protection requirements.