Security threats evolve at the rate of the latest technology
and older equipment often lacks the capacity to implement
current best-practice security algorithms within real-time constraints.
Factors such as key length and algorithm complexity
are limited by processing power when attempting to implement
any form of cryptography.