The length and strength of the encryption key is also an important consideration.
A weak or too short key will produce weak encryption.
The keys used for encryption and decryption must be protected with the same degree of rigor as any other confidential information.