The use of NIDs in the password based encryption table can result in