{"id":581,"date":"2024-01-09T08:00:00","date_gmt":"2024-01-09T08:00:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/2014\/01\/23\/6-tips-for-stronger-encryption\/"},"modified":"2024-01-31T18:14:47","modified_gmt":"2024-01-31T18:14:47","slug":"strong-encryption","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/networks\/strong-encryption\/","title":{"rendered":"Strong Encryption Explained: 6 Encryption Best Practices"},"content":{"rendered":"\n<p>Strong encryption protects data securely from unauthorized access, but the specific algorithms that qualify as strong encryption change over time as computing power increases and researchers develop new ways to break encryption. In practice, security tools provide many encryption options that confuse uneducated users \u2014 including broken encryption options. Yet even the strongest encryption options depend upon key best practices to support effective encryption deployment.<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_68_1 ez-toc-wrap-left counter-flat ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-66d6f334eeaf6\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"ez-toc-cssicon\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #ffffff;color:#ffffff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #ffffff;color:#ffffff\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-66d6f334eeaf6\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.esecurityplanet.com\/networks\/strong-encryption\/#What-Makes-an-Encryption-Algorithm-Strong\" title=\"What Makes an Encryption Algorithm Strong?\">What Makes an Encryption Algorithm Strong?<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.esecurityplanet.com\/networks\/strong-encryption\/#6-Best-Practices-for-Deploying-Strong-Encryption\" title=\"6 Best Practices for Deploying Strong Encryption\">6 Best Practices for Deploying Strong Encryption<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.esecurityplanet.com\/networks\/strong-encryption\/#Strongest-Encryption-Options\" title=\"Strongest Encryption Options\">Strongest Encryption Options<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.esecurityplanet.com\/networks\/strong-encryption\/#Weak-Encryption-Examples\" title=\"Weak Encryption Examples\">Weak Encryption Examples<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.esecurityplanet.com\/networks\/strong-encryption\/#Bottom-Line-Evaluate-Encryption-Solutions-Regularly\" title=\"Bottom Line: Evaluate Encryption Solutions Regularly\">Bottom Line: Evaluate Encryption Solutions Regularly<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\"><span class=\"ez-toc-section\" id=\"What-Makes-an-Encryption-Algorithm-Strong\"><\/span>What Makes an Encryption Algorithm Strong?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>A strong <a href=\"https:\/\/www.esecurityplanet.com\/networks\/encryption\/\">encryption<\/a> algorithm requires a strong encryption key, a strong mathematical algorithm, and a complex encryption process.<\/p>\n\n\n\n<p><strong>Strong encryption keys<\/strong> are passwords for encryption. The longer the password or the more complex the password, the more difficult it will be to guess. However, as binary numbers, encryption keys lack complexity and therefore require length. Most encryption algorithms require a minimum of 128 bits (a combination of 128 zeroes and ones).<\/p>\n\n\n\n<p><strong>Strong mathematical algorithms<\/strong> use the key to feed an algorithm made of simple mathematical processes. Current encryption algorithms use points on an ellipse, multiply large prime numbers, or implement exclusive OR (XOR) logical operations on portions of data as the basis for the algorithm.<\/p>\n\n\n\n<p><strong>A complex encryption process<\/strong> uses a complex combination of the encryption key and the mathematical algorithms on blocks of data over multiple rounds of encryption. For example, the Blowfish algorithm uses simple XOR functions and performs four actions within each of the 16 rounds of encryption:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>XOR the left half of the data with an 18 entry P-array.<\/li>\n\n\n\n<li>Use the XOR data as input for a F-Function (to transform data).<\/li>\n\n\n\n<li>XOR the F-function\u2019s output with the right half of the data.<\/li>\n\n\n\n<li>Swap the left and right halves of the results to use as the inputs in the next round.<\/li>\n<\/ol>\n\n\n\n<p>Individually, each element provides partial protection. The combination of the keys, the algorithms, and the encryption process provides the full strength of the encryption process. Keep in mind that encryption transforms the data to prevent discovery and doesn\u2019t simply mask the data like in <a href=\"https:\/\/www.esecurityplanet.com\/threats\/tokenization-vs-encryption\/\">tokenization<\/a> or provide an output to check for tampering such as in hashing.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">When Strong Encryption Becomes Weak<\/h3>\n\n\n\n<p>Every <a href=\"https:\/\/www.esecurityplanet.com\/trends\/types-of-encryption\/\">type of strong encryption<\/a> starts off unbreakable, but all encryption schemes become weak because of improved cryptographic analysis techniques and stronger computing power. This combination erodes the capability of older encryption algorithms but also powers the new algorithms that will be developed.<\/p>\n\n\n\n<p>For example, the earliest government-endorsed encryption algorithm, DES, encrypted using 64-bit blocks, 16 rounds of encryption, and a key of only 56 bits. This 56 bit key originally taxed existing computing resources but became vulnerable to brute force guessing as computing power improved.<\/p>\n\n\n\n<p>In 1997, AES encryption replaced DES with stronger encryption that increased block sizes to 128 bits, used 10 to 14 rounds of encryption, and increased key sizes to a minimum of 128 bits. The National Institute of Standards and Technology (NIST) currently promotes AES as a strong encryption standard but also acknowledges that quantum computing likely renders AES vulnerable sometime in the next 20 years.<\/p>\n\n\n\n<p>Harnessing ever-more-powerful computing will challenge the effectiveness of encryption algorithms, but failed encryption processes currently expose more data than weak encryption algorithm strength. Best practice adoption protects the encryption process to avoid stolen, revealed, or guessable encryption keys.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\"><span class=\"ez-toc-section\" id=\"6-Best-Practices-for-Deploying-Strong-Encryption\"><\/span>6 Best Practices for Deploying Strong Encryption<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>As with any other security tool in <a href=\"https:\/\/www.esecurityplanet.com\/networks\/network-security\/\">network<\/a> or <a href=\"https:\/\/www.esecurityplanet.com\/cloud\/what-is-cloud-security\/\">cloud security<\/a>, improper deployment undermines even the strongest capabilities. While equal in importance, most organizations will discover a practical hierarchy for implementing the top six encryption best practices.<\/p>\n\n\n\n<p>Security teams generally first use appropriate encryption, learn the encryption environment, and use the longest supportable keys. These best practices don\u2019t require additional tools and deliver immediate benefits for security. Next, an organization will encrypt in layers, secure and centralize key management, and secure app and web encryption. This second triad of best practices delivers comparably critical importance and benefit to the first triad but often requires additional tools, resources, and buy-in to implement.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"990\" height=\"1024\" src=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/ESP_6BestPracticesForDeployingStrongEncryption_2024_DA_rnd2-990x1024.png\" alt=\"6 Best Practices for Deploying Strong Encryption\" class=\"wp-image-33819\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/ESP_6BestPracticesForDeployingStrongEncryption_2024_DA_rnd2-990x1024.png 990w, https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/ESP_6BestPracticesForDeployingStrongEncryption_2024_DA_rnd2-290x300.png 290w, https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/ESP_6BestPracticesForDeployingStrongEncryption_2024_DA_rnd2-768x794.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/ESP_6BestPracticesForDeployingStrongEncryption_2024_DA_rnd2-1485x1536.png 1485w, https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/ESP_6BestPracticesForDeployingStrongEncryption_2024_DA_rnd2-1980x2048.png 1980w\" sizes=\"(max-width: 990px) 100vw, 990px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Use Appropriate Encryption<\/h3>\n\n\n\n<p>Eliminate known-bad or weak encryption and use the appropriate encryption for the task. Weak encryption algorithms (see below) no longer protect data because attackers easily break the algorithms or guess the keys using modern computing power. Security tools still include weak options to enable backward compatibility for previously encrypted data, but you should eliminate the current use of known-bad encryption.<\/p>\n\n\n\n<p>Also, different types of encryption will be required for different uses. For example, asymmetric encryption uses public encryption keys to provide superior encryption for data transmission and data sharing, but asymmetric encryption will be too operationally intense to provide efficient and usable encryption for database fields, <a href=\"https:\/\/www.esecurityplanet.com\/threats\/disk-vs-file-encryption-which-is-best-for-you\/\">full-disk drives, or local files<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Learn the Encryption Environment<\/h3>\n\n\n\n<p>Assess and inventory encryption use throughout to replace obsolete protections and to ensure universal application of other encryption best practices. Just as with any other security practice such as asset discovery or data analysis, unknowns can\u2019t be monitored or controlled.<\/p>\n\n\n\n<p>Similarly, compare current encrypted data use against data use throughout the organization. Almost all organizations apply <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-full-disk-software-products\/\">full disk encryption<\/a> to servers to protect important data at rest, but sensitive data requires continuous protection and data use may require additional file, email, or database encryption.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Use the Longest Supportable Encryption Keys&nbsp;<\/h3>\n\n\n\n<p>Adopt <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-password-managers\/\">password managers<\/a> or centralized encryption management to offset the limited capacity of humans to memorize passwords and increase computing power to offset operational limitations. The longer the key, the stronger the security.<\/p>\n\n\n\n<p>However, universally increased encryption keys increase costs and some organizations can\u2019t afford using the strongest option for all data. The best approach usually restricts data to specific systems and then applies different key lengths for different purposes. For example, shorter keys protect less sensitive data on a laptop and longer keys protect sensitive data stored on a server.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Encrypt in Layers<\/h3>\n\n\n\n<p>Use multiple types and multiple layers of encryption to improve resilience against attacks. Just as with any other security technology, encryption requires defense in depth and multiple layers of encryption limit the damage possible from the failure of any single encryption solution &#8211; especially for the most critical data.<\/p>\n\n\n\n<p>Each later hardens the environment and further resists unauthorized decryption attempts. For example, <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/security\/fundamentals\/data-encryption-best-practices\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft recommends<\/a> using disk encryption to encrypt data at rest, separate database encryption, and encrypted VPN gateways for data transmission.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Secure &amp; Centralize Key Management<\/h3>\n\n\n\n<p>Use encryption experts and centralize encryption key management for improved security. Attackers target the weakest point and won\u2019t need to spend resources to crack an encryption algorithm when the keys can simply be stolen. The more important the data, the more important it is that security professionals control and manage the encryption key process.<\/p>\n\n\n\n<p>A fully trained security team can enact centralized key management to professionally generate, rotate, renew, and retire encryption keys. Centralized management enables higher security levels and improved security processes such as regular access or audit log reviews, encryption tracking within <a href=\"https:\/\/www.esecurityplanet.com\/products\/disaster-recovery-solutions\/\">long-term backups<\/a>, and secure access management of encryption resources.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Secure App &amp; Web Encryption<\/h3>\n\n\n\n<p>Enable improved application and website encryption through professional tools and encryption education. The <a href=\"https:\/\/owasp.org\/www-project-top-ten\/\" target=\"_blank\" rel=\"noreferrer noopener\">OWASP Top 10<\/a> lists the most serious and common vulnerabilities for developers (DevOps) and web application security. Cryptographic failures occupy second place on this list because of the poor management of encryption components, the use of weak encryption algorithms, or the improper deployment of encryption algorithms.<\/p>\n\n\n\n<p><strong>Weak encryption algorithms<\/strong> undermine security, but DevOps programmers don\u2019t always possess the encryption expertise to recognize weak encryption. Security teams educate Dev teams with lists of approved and disallowed encryption algorithms or libraries to reduce weak encryption risk. DevOps further reduces this risk with <a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-scanning-tools\/\">application vulnerability scanners<\/a> that detect inappropriate use of encryption.<\/p>\n\n\n\n<p><strong>Poor management of encryption components<\/strong> deviates from the principle of secured and centralized key management by leaking keys or improperly managing certificates. For example, maintain and secure web server secure sockets layer (SSL) digital certificates to facilitate encrypted connections and to prevent attackers from stealing and using corporate certificates in impersonation attacks.<\/p>\n\n\n\n<p><strong>Improper deployment of encryption<\/strong> tends to originate from programming mistakes or misunderstandings about how to execute complex encryption algorithm processes. Use an established encryption solution to avoid common issues such as failure to change variables, improperly generating random numbers for key generation, or using code that becomes vulnerable to malicious or unexpected inputs to the algorithm.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\"><span class=\"ez-toc-section\" id=\"Strongest-Encryption-Options\"><\/span>Strongest Encryption Options<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>With best practices in place, select the strongest encryption options. In many cases, <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-encryption-software\/\">encryption tools<\/a> provide a selection that includes known-bad (covered below), good, and better algorithms. Yet the menu options rarely provide any clues as to which options provide in which category or which may be unsafe.<\/p>\n\n\n\n<p>Encryption seen as good provides adequate protection, but select better encryption as time, capabilities, and budgets allow. The higher the risk of data theft or the more sensitive the data, the more urgently a transition to better encryption should be considered.<\/p>\n\n\n\n<p>Currently, there\u2019s no consensus for the \u201cbest\u201d encryption because cost and use case play such a strong role in determining what any organization can deploy. Even newer quantum-resistant algorithms aren\u2019t seen as superior solutions yet because they remain limited in commercial availability and simply haven\u2019t been around long enough to be thoroughly tested.<\/p>\n\n\n\n<p>Additionally, research the algorithms built into systems to determine if your organization needs to invest in stronger encryption options. For example, the bcrypt encryption library built into UNIX uses the Blowfish cipher (good encryption) and the Password-Based Key Derivation Function 2 (PBKDF2) uses RSA key standards (better encryption).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Good Encryption Options<\/h3>\n\n\n\n<p>Good encryption algorithms such as Blowfish, Triple DES, and WPA2 provide acceptable encryption, assuming that the organization also observes encryption best practices.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Blowfish<\/strong> provides open-source symmetric encryption built into many Unix and Linux libraries for file and full-disk encryption; however, the use of a small block size limits its effective use to files under 4 GB.<\/li>\n\n\n\n<li><strong>Triple DES (TDES or 3DES)<\/strong> can still be found used in older payment systems or to protect ATM pin codes but is considered vulnerable to the Sweet32 Birthday attack and was retired from Office 365 by Microsoft in 2019.<\/li>\n\n\n\n<li><strong>Wi-Fi Protected Access Version 2 (WPA2)<\/strong> can be found in most wireless routers and provides reasonable protection for encrypted communications.<\/li>\n<\/ul>\n\n\n\n<p>Retain less sensitive data currently encrypted using such protocols and allow less sensitive data to be transmitted using these encryption algorithms.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Better Encryption Options<\/h3>\n\n\n\n<p>Better encryption such as AES, ECC, RSA, Twofish, and WPA3 provide the current best-practice encryption options widely available and are superior to the good encryption algorithms (above).<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>The Advanced Encryption Standard (AES)<\/strong>, endorsed by NIST, supports encryption key sizes between 128 and 256 bits and uses both substitution and permutation transformations for encryption.<\/li>\n\n\n\n<li><strong>Elliptic-curve cryptography (ECC)<\/strong> uses points on an ellipse to provide strong encryption with key sizes starting at 192-bits (default is 256 bits).<\/li>\n\n\n\n<li><strong>Rivest-Shamir-Adleman (RSA)<\/strong> encryption uses large prime numbers as encryption keys that range between 512 and 4096 bits.<\/li>\n\n\n\n<li><strong>Twofish<\/strong> encryption succeeds the Blowfish algorithm to provide improved encryption with key sizes between 128 and 256 bits.<\/li>\n\n\n\n<li><strong>Wi-Fi Protected Access Version 3 (WPA3)<\/strong> provides improved encryption capabilities over WPA2 and should be adopted on supported wi-fi hardware.<\/li>\n<\/ul>\n\n\n\n<p>Apply these better encryption standards to important, sensitive, and regulated data to provide stronger resistance to brute force and algorithm attacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\"><span class=\"ez-toc-section\" id=\"Weak-Encryption-Examples\"><\/span>Weak Encryption Examples<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Professionals avoid broken or known-weak encryption standards such as DES, WEP, and WPA. Data previously encrypted using these standards should be actively re-encrypted using stronger algorithms (above).<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Data Encryption Standard (DES)<\/strong> provided the first NIST encryption standard, but the 56-bit keys are too short and vulnerable to brute force guessing attacks.<\/li>\n\n\n\n<li><strong>Wired Equivalent Privacy (WEP)<\/strong> introduced wireless security as part of the IEEE 802.11 wireless standard, but severe algorithm design flaws render this algorithm obsolete and dangerous to use.<\/li>\n\n\n\n<li><strong>Wi-Fi Protected Access (WPA)<\/strong> replaced WEP with improved encryption, yet remained vulnerable to spoofing attacks and was replaced by WPA2 and WPA3.<\/li>\n<\/ul>\n\n\n\n<p>Many older computer protocols, such as secure sockets layer (SSL) and the original transport layer security (TLS) standards, also incorporate obsolete encryption algorithms. IT security teams must locate and disable the use of these older protocols throughout the organization.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\"><span class=\"ez-toc-section\" id=\"Bottom-Line-Evaluate-Encryption-Solutions-Regularly\"><\/span>Bottom Line: Evaluate Encryption Solutions Regularly<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The strongest encryption of the 1970s didn\u2019t survive replacement by stronger encryption in the 1990s. Yet those once-strongest encryption options of the 90s now show weaknesses to modern computing power. Fortunately, even as the increased computing power undermines older encryption standards, the computing power also enables the adoption of stronger, more complex encryption with larger key sizes.<\/p>\n\n\n\n<p>Effective deployment of best practices creates a security environment that enables continuous management and evaluation of encryption processes. Upgrading <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-encryption-software\/\">encryption tools<\/a> will usually be sufficient to maintain encryption as a fundamental layer in any security stack, but continue to evaluate encryption options regularly to remain secure.<\/p>\n\n\n<div id=\"ta-campaign-widget-66d6f334eae77-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6f334eae77\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6f334eae77\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6f334eae77\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6f334eae77\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6f334eae77\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6f334eae77\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Stronger encryption best practices increase the security of your network. Discover how to achieve stronger encryption now.<\/p>\n","protected":false},"author":271,"featured_media":33374,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[14],"tags":[2369,3790,841,860,3414],"b2b_audience":[25],"b2b_industry":[],"b2b_product":[377],"class_list":["post-581","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networks","tag-cloud-security","tag-cybersecurity","tag-data-security","tag-encryption","tag-network-security","b2b_audience-audience","b2b_product-gateway-and-network-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Strong Encryption Explained: 6 Encryption Best Practices<\/title>\n<meta name=\"description\" content=\"Stronger encryption best practices increase the security of your network. Discover how to achieve stronger encryption now.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/networks\/strong-encryption\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Strong Encryption Explained: 6 Encryption Best Practices\" \/>\n<meta property=\"og:description\" content=\"Stronger encryption best practices increase the security of your network. Discover how to achieve stronger encryption now.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/networks\/strong-encryption\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-09T08:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-31T18:14:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240105-strong-encryption.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Chad Kime\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chad Kime\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/strong-encryption\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/strong-encryption\/\"},\"author\":{\"name\":\"Chad Kime\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9\"},\"headline\":\"Strong Encryption Explained: 6 Encryption Best Practices\",\"datePublished\":\"2024-01-09T08:00:00+00:00\",\"dateModified\":\"2024-01-31T18:14:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/strong-encryption\/\"},\"wordCount\":2097,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/strong-encryption\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240105-strong-encryption.png\",\"keywords\":[\"cloud security\",\"cybersecurity\",\"data security\",\"encryption\",\"network security\"],\"articleSection\":[\"Networks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/strong-encryption\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/networks\/strong-encryption\/\",\"name\":\"Strong Encryption Explained: 6 Encryption Best Practices\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/strong-encryption\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/strong-encryption\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240105-strong-encryption.png\",\"datePublished\":\"2024-01-09T08:00:00+00:00\",\"dateModified\":\"2024-01-31T18:14:47+00:00\",\"description\":\"Stronger encryption best practices increase the security of your network. Discover how to achieve stronger encryption now.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/strong-encryption\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/strong-encryption\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/strong-encryption\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240105-strong-encryption.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240105-strong-encryption.png\",\"width\":1400,\"height\":900,\"caption\":\"Image: wigglestick\/Adobe Stock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/strong-encryption\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Strong Encryption Explained: 6 Encryption Best Practices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9\",\"name\":\"Chad Kime\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg\",\"caption\":\"Chad Kime\"},\"description\":\"eSecurity Planet lead writer Chad Kime covers a variety of security, compliance, and risk topics. Before joining the site, Chad studied electrical engineering at UCLA, earned an MBA from USC, managed 200+ ediscovery cases, and helped market a number of IT and cybersecurity products, then transitioned into technical writing policies and penetration test reports for MSPs and MSSPs. In his free time, Chad enjoys walks on the beach with his wife, annoying his children, and trying to carve out time for movies, books, video games, and bike rides.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Strong Encryption Explained: 6 Encryption Best Practices","description":"Stronger encryption best practices increase the security of your network. Discover how to achieve stronger encryption now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/networks\/strong-encryption\/","og_locale":"en_US","og_type":"article","og_title":"Strong Encryption Explained: 6 Encryption Best Practices","og_description":"Stronger encryption best practices increase the security of your network. Discover how to achieve stronger encryption now.","og_url":"https:\/\/www.esecurityplanet.com\/networks\/strong-encryption\/","og_site_name":"eSecurity Planet","article_published_time":"2024-01-09T08:00:00+00:00","article_modified_time":"2024-01-31T18:14:47+00:00","og_image":[{"width":1400,"height":900,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240105-strong-encryption.png","type":"image\/png"}],"author":"Chad Kime","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Chad Kime","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/networks\/strong-encryption\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/strong-encryption\/"},"author":{"name":"Chad Kime","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9"},"headline":"Strong Encryption Explained: 6 Encryption Best Practices","datePublished":"2024-01-09T08:00:00+00:00","dateModified":"2024-01-31T18:14:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/strong-encryption\/"},"wordCount":2097,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/strong-encryption\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240105-strong-encryption.png","keywords":["cloud security","cybersecurity","data security","encryption","network security"],"articleSection":["Networks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/networks\/strong-encryption\/","url":"https:\/\/www.esecurityplanet.com\/networks\/strong-encryption\/","name":"Strong Encryption Explained: 6 Encryption Best Practices","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/strong-encryption\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/strong-encryption\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240105-strong-encryption.png","datePublished":"2024-01-09T08:00:00+00:00","dateModified":"2024-01-31T18:14:47+00:00","description":"Stronger encryption best practices increase the security of your network. Discover how to achieve stronger encryption now.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/strong-encryption\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/networks\/strong-encryption\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/networks\/strong-encryption\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240105-strong-encryption.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240105-strong-encryption.png","width":1400,"height":900,"caption":"Image: wigglestick\/Adobe Stock"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/networks\/strong-encryption\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Strong Encryption Explained: 6 Encryption Best Practices"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9","name":"Chad Kime","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg","caption":"Chad Kime"},"description":"eSecurity Planet lead writer Chad Kime covers a variety of security, compliance, and risk topics. Before joining the site, Chad studied electrical engineering at UCLA, earned an MBA from USC, managed 200+ ediscovery cases, and helped market a number of IT and cybersecurity products, then transitioned into technical writing policies and penetration test reports for MSPs and MSSPs. In his free time, Chad enjoys walks on the beach with his wife, annoying his children, and trying to carve out time for movies, books, video games, and bike rides.","url":"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/581"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/271"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=581"}],"version-history":[{"count":3,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/581\/revisions"}],"predecessor-version":[{"id":33820,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/581\/revisions\/33820"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/33374"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=581"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=581"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=581"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=581"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=581"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=581"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}