Comparison of some cryptographic methods used in information exchange protocols