The quality of a cryptographic procedure depends on the effort a potential attacker would have to expend to “crack” a message without knowing the key. The effort consists of the required computing time (i.e., number of computing operations) and the required memory. Weak cryptographic methods can be cracked with relatively little effort (i.e., also relatively low costs).