Therefore
•
Algorithms must be
public
and
verifiable
•
We need to be able to estimate the risk of
compromise
•
The solution must practical for its users, and
impractical for an attacker to break