Watch this video on YouTube
What is a potential challenge associated with the implementation of strong encryption techniques ?