...
Weak cryptographic algorithms may be used in scenarios that specifically call for a breakable cipher. For instance the ROT13 cipher is commonly used on bulletin boards and web sites when the purpose of encryption is to protect people from the information, rather than protect information from the people.
Related Guidelines
MITRE 2009CWE | CWE ID -327, Use of a broken or risky cryptographic algorithm |
...