Cryptanalysis
One possibility: security through obscurity
Restricted algorithms: depend on keeping inner workings of algorithm secret.
Difficult for communications between parties with no prior contact, as in Internet commerce applications.
Wildly optimistic to assume details of security mechanisms won’t fall into the wrong hands.
No quality control or standardization