Security plays a critical position in preserving information privacy and secrecy. Many encryption strategies are available to protect data during transmission or storage. These encryption methods vary in terms of strength, speed, and resource consumption (CPU usage, memory, and power). This study aims to present the most popular and interesting algorithms currently in use