When considering cryptology, it is important to make the
distinction between protocols and algorithms. This is
especially important in light of the misleading claims
sometimes made by companies that produce cryptographic products (either
out of carelessness or misrepresentation). For example, a company
might claim: "If you use our product, your data is secure
because it would take a million years for the fastest computers
to break our encryption!" The claim can be true, but still
not make for a very good product. A true claim about the strength of an
algorithm by itself does not necessarily mean that a whole protocol that
uses that algorithm as one of its steps does not have other weaknesses.
A protocol is a specification of the complete set of steps
involved in carrying out a cryptographic activity, including
explicit specification of how to proceed in every contingency.
An algorithm is the much more narrow procedure involved in
transforming some digital data into some other digital data.
Cryptographic protocols inevitably involve using one or more
cryptographic algorithms, but security (and other cryptographic
goals) is the product of a total protocol.