Using A Weak Encryption Methodologies