These are my encryption-decryption algorithms which I learned and implemented in the cybersecurity course