SHARE
Facebook X Pinterest WhatsApp

Encryption Adds Extra Layer of Security to Sensitive Data

With tales of outgoing employees taking off with confidential corporate data and mobile workers losing laptops and USBs while on the road, it’s extremely important that data is kept safe from prying eyes. Encryption offers an extra layer of security to keep lost data safe by rendering data worthless to unauthorized users. Algorithms convert data […]

Written By
thumbnail
Amanda White
Amanda White
Feb 8, 2013

With tales of outgoing employees taking off with confidential corporate data and mobile workers losing laptops and USBs while on the road, it’s extremely important that data is kept safe from prying eyes.

Encryption offers an extra layer of security to keep lost data safe by rendering data worthless to unauthorized users. Algorithms convert data into ciphertext so that it can’t be cracked.

The Triple Data Encryption Algorithm (TDEA) uses the Data Encryption Standard three times over to ensure data is kept safe and secure. The National Institute of Standards and Technology offers a recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher. In it, the NIST defines the mathematical steps necessary “to cryptographically protect data using TDEA and to subsequently process such protected data.”

The document provides such tidbits of information as a list of 48 keys that should be avoided because they produce four distinct subkeys that are considered weak. You’ll also find a list of primitive functions that are “critical to the strength of the transformations resulting from the algorithms.”

While the recommendation is geared toward federal organizations, it can most certainly be tailored to fit your organization’s encryption needs.

Below are more tools from our IT Downloads library that will help keep your data safe. One will get you up to speed on encryption basics and the other offers guidance on the Secure Hash Standard as specified by the NIST.

Encryption Basics: Encryption has become a more accessible technology for securing your data, both in transit and on storage devices. But it still is not simple. The information in this article will help you grasp the basics of encryption tactics and standards.

Guide to the Secure Hash Standard: This standard specifies hash algorithms that can be used to generate digests of messages. The digests are used to detect whether messages have been changed since the digests were generated.

Recommended for you...

How DeFi is Reshaping the Future of Finance
Kihara Kimachia
Aug 25, 2022
Top Secure Access Service Edge (SASE) Solutions
Aminu Abdullahi
Aug 22, 2022
Best Data Loss Prevention (DLP) Tools
Aminu Abdullahi
Aug 19, 2022
Data Lake Governance & Security Issues
Chad Kime
Aug 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.