- Playfair substitution cipher
- Vigenere substitution cipher
- Hill substitution cipher
- Caeser substitution cipher
- Rail Fence transposition cipher
- Vernam substitution cipher
- Columnar transposition cipher
- DES (Data Encryption Standard)
- AES (Advanced Encryption Standard)
- Elgamel Crypto system
- RSA (Rivest–Shamir–Adleman)
- Diffie-Hellman Key exchange algorithm
- Man In The Middle Attack Simulation
- Digital Signature Algorithm
- Elliptic curve cryptography
- Message Authenticaiton Code with SHA-1
- Blowfish Algorithm
- Statistical attack
- Euclidean algorithm for GCD calculation
- Extended Euclidean algorithm for modular multiplicative inverse calculation
- Chinese remainder theorem for set of modular equations