Browsing: the strengths of symmetric key cryptography