RSA: Rivest-Shamir-Adleman: RSA is a public key encryption algorithm and standard for encrypting data over the internet. It is an asymmetric cryptography algorithm means works on two different keys. Uses the modular function to encrypt and decrypt the message based on prime factoring concept.Use:Today any website that has secure HTTP connection uses RSA Weakness: Searching the message space:One of the seeming weaknesses of public key cryptography is that one has to give away to everybody the algorithm that encrypts the data. If the message space is small, then one could simply try to encrypt every possible message block, until a match is found with one of the ciphertext blocks. In practice, this would be an insurmountable task because the block sizes are quite large Triple DES: It was designed to replace DES algorithm it takes three 64 bit keys for over key length of 192 bits. The process of encryption is same as DES but it repeated three times the data is encrypted with the first key and then decrypted with the second key and then encrypted with the third key3DES Modes-• ECB- Electronic Code Book: This is the most commonly used mode of operationThis works same as ECB mode of DESAdvantages:Reliability and longer key length which eliminates the many of attacks that can be used to reduce the amount of time it takes to break DESUse:OneNote uses 3DES with 192-bit key length. To protect password and system dataWeakness:The size of the messaging it can encrypt is small 64 bit and it’s slowReplaced by: AESAES: Advance Encryption Standard – It is most widely adopted symmetric encryption algorithm and largely considered impervious to all attacks. Although it is extremely efficient in 128-bit it also uses keys of 192 and 256 for heavy duty encryptionUse:It is used in U.S government and other organizationsBlowfish: This is symmetric cipher which splits the message into blocks of 64 bit and encrypts them individually It takes variable length key from 32 bits to 448 bits and makes it perfect for residential and exportable utilize. It is known for its enormous speed and general adequacy Use:Can be found in software categories ranging from e-commerce platform for securing payments to password management tools.Weakness:A reduced round variant of Blowfish is known to be suspectable to known plaintext attacks on reflective weak keys