This paper provides a definition of the algorithms used in security-related embedded devices and those used by networking security protocols. Examples of the roles the different algorithms play and how they are used is discussed.

Note: By clicking on the above link, this paper will be emailed to your TechOnLine log-in address by Mentor Graphics.