Discover Vendors/Products News
Security IC suppliers split over encryption methods
The issue of how best to do this is proving divisive. In one camp, suppliers insist that encryption algorithms are best implemented in software directly into the network processor protocol stack. Another set of networking chipmakers contends that security functions should be addressed through the use of a separate co-processor.
A number of OEMs attending last week's Networld+Interop show here weighed in on the subject, and the majority appear to agree with the latter group that software alone no longer provides the answer.
The link for this article located at EB News is no longer available.