Identifying the encryption algorithm