Limitations in cryptographic functions