of cryptography uWeaknesses of using this form of cryptography uDescription of algorithms that implement symmetric