Therefore
Algorithms must be public and verifiable
We need to be able to estimate the risk of
compromise
The solution must practical for its users, and
impractical for an attacker to break