Decrypt given data previously encoded with rc2-40 cipher algo. RC2 with a 40-bit key size, offering very weak encryption and typically used in environments with strict export restrictions. RC2-40 was used in countries where strong encryption was restricted, providing weak encryption to comply with export controls. RC2-40 is extremely insecure and should not be used in any modern applications due to its vulnerability to brute-force attacks. Our decryption process assumes the IV string is prepended in the encoded string during the encryption process. You can not decrypt and get the correct results if the IV or passphrase mismatch occurs between encryption and decryption process.