Implementing the RSA algorithm for encryption and decryption, and then testing its vulnerability with Pollard's p-1 Algorithm, Pollard's rho Algorithm, and Fermat's factorization Algorithm. Benchmarking their performance and plotting their effectiveness.