Security analysis of cryptographic algorithms