Hannusch, CarolinGirgin, Ecem2022-04-182022-04-182022-04-18http://hdl.handle.net/2437/330763In today's world, most of the actions are made through the internet. For example, in communication online, hundreds, thousands of messages are sent every day. How do we keep messages secure and not read from a third party? In basic answer, with the help of cryptography. Cryptographic algorithms are sets of methods or rules that are used to encrypt and decrypt messages in a cryptographic system. Cryptography keeps the data securely therefore it has a vital role in our lives. The report consists of brief information about cryptography history and the functioning structure of symmetric, asymmetric algorithms, and hash functions. The symmetric algorithms DES, 3DES, AES, and the asymmetric algorithms Diffie-Hellman, RSA, ECC, and hash functions, are analyzed regarding their features.40encryptographic algorithmssymmetric algorithmsasymmetric algorithmshash functionsCryptographic Algorithms and Their Algoritmic SolutionsDEENK Témalista::Informatika