Using A Weak Encryption Protocols