Pros and Cons of Weakening Encryption Tag