weaknesses-of-symmetric-key-cryptography