Identifying Insecure Cryptographic Algorithms