Securing data is essential, whether when in motion or stored on devices. Encryption ensures that communications remain confidential and that important data stored on devices cannot be accessed in case they are lost or stolen.
This policy outlined in TechRepublic Premium offers recommendations for implementing encryption technologies within an organization. These technologies have been extensively reviewed, are free from any legal restrictions, and are known to function reliably.
Highlighted text from the guidelines:
REQUIREMENTS FOR HASH FUNCTIONS
For any application using secure hash algorithms, it is recommended to prioritize the use of SHA-3.
SHA-2 can also be utilized for such applications. Please refer to NIST SP 800-57 Part 1 Rev. 4, section 5.6, titled “Guidance for Cryptographic Algorithm and Key-Size Selection,” and NIST SP 800-131A Rev. 1 for detailed technical recommendations on implementing SHA-2.
Considering SHA-1 is now deemed insecure, it should not be used for generating digital signatures, timestamps, or any other applications requiring collision resistance. For legacy use of SHA-1, refer to NIST SP 800-131A Rev. 1 for specific technical advice.
Enhance your data protection with our comprehensive policy document spanning six pages. Originally priced at $19, it’s now available for download at only $9. Alternatively, get complimentary access with a Premium yearly subscription. Learn more by clicking here.
TIME SAVED: The creation of this content involved 12 hours dedicated to writing, editing, and research.
