You will be able to encrypt and decrypt based on these methods.
Do consider the fact that there are many variations of all these
encryption methods.
The method followed in few of these ciphers here is the basic form from
which others have been implemented.