System resource limitations, particularly in tier 2 entities, may limit systems’ access
to robust encryption, while necessitating frequent, small bursts of information in
a standard format.
The expected asymmetry between a tier 2 system’s encryption
resources and the resources of, for instance, an attacker with a multi-core analysis
system, aids in the attackers ability to capture information. Further, the frequency
of these transmissions affords greater opportunity, and the standard format may aid
in cryptanalysis.