Weak Encryption Methodology