Recently, Internet of Things (IoT) is a very popular concept. It has become an area that can be highly experienced with the end-user products which are becoming more and more widespread in our daily lives. Therefore, the security of IoT devices has merged as an area of the research due to its increasing usage of these devices. Most of the IoT devices are designed by considering optimum price-performance ratio. Hence, the hardware of IoT devices are constrained in order to design affordable devices. However, these constraints of IoT devices may result in a severe security risks. Hence, the examination of these security risks is a contemporary research area. In this paper, the IoT device implementation of major cryptographic algorithms is examined. The same cryptographic algorithms are run on two different IoT devices which have different constraints, different features and different prices. Tests with respect to pre-defined metrics are conducted and the measurements are analyzed by comparing the results. At the end of the paper, all results and analyzes are interpreted.