probable that keys with 128 bits will remain unbeakable for the foreseeable future. The terms strong authentication’ and weak authentication’ are sometimes used to distinguish between algorithms that, to all intents and purposes, cannot be broken with existing technologies and knowledge (strong) from those that can be (weak)