Implementation and Analysis of various Encryption Techniques