. . . . "Consequently,processing systems, such as personal computers and workstations, that were previously viewed as not possessing sufficient processing power to break many so-called \"secure cryptographic ciphers are now, given their current power and sophistication,providing third parties with the necessary capability to effectively break those same ciphers." .