An encryption algorithm can have weaknesses that could allow an attacker to listen in.
Read in full here: