Existing Encryption Techniques Research Articles