E3S Web of Conferences.
EDP Sciences.
Vol. 209.
2020.
Data protection is a complex problem affecting many areas including computers and communications. To ensure the necessary protection of applications, cryptographic methods and various algorithms are used. In this paper general overview of cryptography, information security and the comparison of algorithms with symmetric and asymmetric keys is presented. Factors ensuring the achievement of efficiency, flexibility and security are the basis of this research. As a result, the best solution for symmetric and asymmetric encryption is produced. © Published under licence by IOP Publishing Ltd.