Designing and implementing a cryptographic algorithm is a complex technical effort, and the difficulty multiplies when the method must be