discuss 1 strength and 1 weakness of symmetric key cryptography. discuss 1 strength and 1 weakness of asymmetric key cryptography. in your opinion, what is a deciding factor in determining which algorithm to implement?