Using A Weak Encryption Method