Several Proofs of Security for a Tokenization Algorithm