asymmetric cryptography algorithms

Description of algorithms that implement asymmetric cryptography and strengths / weaknesses of each algorithm  atleast two or three  algorithms..