GAP Security (Encryption) procedure Example of central security (encryption) procedure Example of peripheral security (encryption) procedure