Methods for providing data security are described. A security device (10) and a plug-in device (30) work in conjunction to enable encryption and decryption of data. A secret is stored by one of the security device (10) or the plug-in device (30). While the secret is required for constructing a key, the key cannot be constructed from the secret alone. Unauthorized devices or users are thereby prevented from accessing the key.