Implementing cryptography in systems

What limitations or constraints are present when implementing cryptography in systems?

Get a 10 % discount on an order above $ 50
Use the following coupon code :
TOPCLASS