In the realm of cryptography and data security, could you comprehensively analyze and discuss the fundamental distinctions between symmetric and asymmetric encryption algorithms, highlighting their respective strengths, weaknesses, and use cases, while also providing notable examples of each type of algorithm, and explaining how their specific characteristics impact their overall effectiveness and suitability for various applications in the modern digital landscape?