A Constructive Treatment Of Enhanced Encryption Schemes