There are two sample programs. The first uses 2-key TDEA, and the second exercises 3-key TDEA. Both programs use filters (see Pipelining). The key is declared on the stack using a SecByteBlock to ensure the sensitive material is zeroized. Similar could be used for both plain text and recovered text.