https://gphjournal.org/index.php/m/issue/feed GPH - International Journal of Mathematics 2023-11-27T11:46:50+00:00 Dr. EKEKE, JOHN NDUBUEZE drekekejohn@gmail.com Open Journal Systems <p style="font-family: Aptos;"><strong><span style="color: #222222;"><span style="font-family: 'Aptos', serif;"><span style="aptos: Arial, serif;"><span style="font-size: medium; font-family: 'Aptos', serif;"><span style="color: #000000;">The</span></span></span><span style="aptos: Arial, serif;"><span style="font-size: medium; font-family: 'Aptos', serif;"><span style="color: #000000;"> GPH-INTERNATIONAL JOURNAL OF MATHEMATICS (E-ISSN 2795-3278 P-ISSN 2795-3274) </span></span></span><span style="helvetica: Arial, serif;"><span style="font-size: medium; font-family: 'Book Antiqua', serif;"><span style="color: #000000;">is an open-access journal that publishes research articles, reviews, case studies, guest-edited thematic issues, and short communications/letters in all areas of mathematics, applied mathematics, applied commutative algebra, and algebraic geometry, mathematical biology, physics and engineering, theoretical bioinformatics, experimental mathematics, etc</span></span></span></span></span>.<span style="font-size: medium;"> <a title="Journal Impact Factor" href="http://www.gphjournal.org/index.php/index/jif"><span style="color: #222222;"><span style="font-family: 'Book Antiqua', serif;"><span style="helvetica: Arial, serif;"><span style="color: #000000;"><span style="font-size: 1.5em;"><span style="text-shadow: #FF0000 0px 0px 2px;">Impact Factor: 1.114</span></span></span></span></span></span></a></span></strong></p> https://gphjournal.org/index.php/m/article/view/1139 CRYPTOGRAPHIC ENCRYPTION BASED ON RAIL-FENCE PERMUTATION CIPHER 2023-11-27T11:44:11+00:00 Michael N. John noreplygphjournal@gmail.com Ogoegbulem Ozioma noreplygphjournal@gmail.com Udoaka Otobong. G. noreplygphjournal@gmail.com Boniface O. Nwala noreplygphjournal@gmail.com Obi Perpetua Ngozi noreplygphjournal@gmail.com <p><strong>Cryptographic systems play a pivotal role in securing sensitive information in various domains. Permutation ciphers, a fundamental component of classical cryptography, involve the rearrangement of characters in a message to achieve confidentiality. This paper explores the principles and applications of permutation ciphers in cryptographic encryption. The study delves into the historical context, the underlying mechanisms of permutation ciphers, and their relevance in contemporary cryptographic practices. Using permutation on n symbols and Rail Fence Cipher, we construct an algorithm for encrypting and decrypting a message for n = 2, 3</strong></p> 2023-11-26T00:00:00+00:00 ##submission.copyrightStatement## https://gphjournal.org/index.php/m/article/view/1140 NUMBER THEORY IN RSA ENCRYPTION SYSTEMS 2023-11-27T11:46:50+00:00 Michael N. John storm4help1@gmail.com Ogoegbulem Ozioma Ozioma.ogoegbulem@dou.edu.ng Obukohwo, Victor victor.obukohwo@dou.edu.ng Henry Etaroghene Egbogho egbogho.henry@dou.edu.ng <p><strong>RSA encryption is a widely employed cryptographic system based on the principles of number theory. Number theory is the branch of pure mathematics that studies positive whole numbers, called natural numbers and integers. Number theory seeks to discover relationships existing between numbers. Cryptography is the study of encryption and decryption of information. By encrypting information, data can be transmitted to the intended recipient securely across the internet. In this paper, we propose an RSA encryption scheme based on number theory, showing its applications to cryptography.</strong></p> 2023-11-26T12:04:32+00:00 ##submission.copyrightStatement##