Main Article Content
Abstract
Keywords
Article Details
Authors retain the copyright without restrictions for their published content in this journal. IJSRTM is a SHERPA ROMEO Journal.
Publishing License
This is an open-access article distributed under the terms of
References
- Norman D. Jorstad “Cryptographic Algorithm Metricsâ€, January, 1997, pp. 1-10
- Prof. Dr. Hilal Hadi Salih & Dr. Ahmed Tariq Sadiq, “Proposal of new block Cipher Algorithmâ€,
- pp. 10-18.
- Bhaskaran Raman, “Cryptography & Network Securityâ€, IIT Kanpur, May 2005
- “Feistel Cipherâ€, Wikipedia, the free encyclopaedia Retrieved from http://www. Wikipedia .org.
- Vishwa gupta, “International Journal of Advanced Research in Computer Science and Software
- Engineeringâ€, Vol. 2, Issue 1, January 2012, pp. 1-3.
- Behrouz A. Forouzan, “Data Communication and Networkingâ€, Fourth Edition, pp.968-1030
References
Norman D. Jorstad “Cryptographic Algorithm Metricsâ€, January, 1997, pp. 1-10
Prof. Dr. Hilal Hadi Salih & Dr. Ahmed Tariq Sadiq, “Proposal of new block Cipher Algorithmâ€,
pp. 10-18.
Bhaskaran Raman, “Cryptography & Network Securityâ€, IIT Kanpur, May 2005
“Feistel Cipherâ€, Wikipedia, the free encyclopaedia Retrieved from http://www. Wikipedia .org.
Vishwa gupta, “International Journal of Advanced Research in Computer Science and Software
Engineeringâ€, Vol. 2, Issue 1, January 2012, pp. 1-3.
Behrouz A. Forouzan, “Data Communication and Networkingâ€, Fourth Edition, pp.968-1030