The true strength of any strong secret-key encryption algorithm greatly depends on how the Secret Keys are managed and protected. For example, it is important to know from whom the encrypted data needs to be kept secret in order to determine how to protect the Secret Keys. Even the encrypted data itself might need to be communicated or stored as privately or securely as possible in order to help protect against a possible (but improbable) breakthrough in crypto-analysis which could render strong encryption ineffective. Also relevant is the length of time that the encrypted data needs to be kept concealed in order to decide on key size and management type.