If two employees are encrypting traffic between them using a single encryption key, which of the following algorithms are they using?