Loading: Analysis: Strong vs. Weak Encryption