Using Public Key Infrastructure (PKI), anyone can send a confidential message using public information, which can only be decrypted with a private key in the sole possession of the intended recipient.
RSA encryption is widely used and is a 'de-facto' encryption standard.
The MD 5 algorithm is intended for digital signature applications , where a large file must be compressed securely before being encrypted
SHA algorithm takes as input a message of arbitrary length and produces as output a 160-bit message digest of the input.
Secure Sockets Layer, SSL is a protocol for transmitting private documents via the Internet. RC5 is a fast block cipher designed by RSA Security.
SSH (Secure Shell) is a secure replacement for telnet and the Berkeley r-utilities and this provides an encrypted channel for logging into another computer over a network, executing commands on a remote computer, and moving files from one computer to another. [1]
[1] (Reference: Cryptography FAQs published on the World Wide Web)