GPH - International Journal of Mathematics 2023-11-27T11:46:50+00:00 Dr. EKEKE, JOHN NDUBUEZE Open Journal Systems <p style="font-family: Aptos;"><strong><span style="color: #222222;"><span style="font-family: 'Aptos', serif;"><span style="aptos: Arial, serif;"><span style="font-size: medium; font-family: 'Aptos', serif;"><span style="color: #000000;">The</span></span></span><span style="aptos: Arial, serif;"><span style="font-size: medium; font-family: 'Aptos', serif;"><span style="color: #000000;"> GPH-INTERNATIONAL JOURNAL OF MATHEMATICS (E-ISSN 2795-3278 P-ISSN 2795-3274) </span></span></span><span style="helvetica: Arial, serif;"><span style="font-size: medium; font-family: 'Book Antiqua', serif;"><span style="color: #000000;">is an open-access journal that publishes research articles, reviews, case studies, guest-edited thematic issues, and short communications/letters in all areas of mathematics, applied mathematics, applied commutative algebra, and algebraic geometry, mathematical biology, physics and engineering, theoretical bioinformatics, experimental mathematics, etc</span></span></span></span></span>.<span style="font-size: medium;"> <a title="Journal Impact Factor" href=""><span style="color: #222222;"><span style="font-family: 'Book Antiqua', serif;"><span style="helvetica: Arial, serif;"><span style="color: #000000;"><span style="font-size: 1.5em;"><span style="text-shadow: #FF0000 0px 0px 2px;">Impact Factor: 1.114</span></span></span></span></span></span></a></span></strong></p> CRYPTOGRAPHIC ENCRYPTION BASED ON RAIL-FENCE PERMUTATION CIPHER 2023-11-27T11:44:11+00:00 Michael N. John Ogoegbulem Ozioma Udoaka Otobong. G. Boniface O. Nwala Obi Perpetua Ngozi <p><strong>Cryptographic systems play a pivotal role in securing sensitive information in various domains. Permutation ciphers, a fundamental component of classical cryptography, involve the rearrangement of characters in a message to achieve confidentiality. This paper explores the principles and applications of permutation ciphers in cryptographic encryption. The study delves into the historical context, the underlying mechanisms of permutation ciphers, and their relevance in contemporary cryptographic practices. Using permutation on n symbols and Rail Fence Cipher, we construct an algorithm for encrypting and decrypting a message for n = 2, 3</strong></p> 2023-11-26T00:00:00+00:00 ##submission.copyrightStatement## NUMBER THEORY IN RSA ENCRYPTION SYSTEMS 2023-11-27T11:46:50+00:00 Michael N. John Ogoegbulem Ozioma Obukohwo, Victor Henry Etaroghene Egbogho <p><strong>RSA encryption is a widely employed cryptographic system based on the principles of number theory. Number theory is the branch of pure mathematics that studies positive whole numbers, called natural numbers and integers. Number theory seeks to discover relationships existing between numbers. Cryptography is the study of encryption and decryption of information. By encrypting information, data can be transmitted to the intended recipient securely across the internet. In this paper, we propose an RSA encryption scheme based on number theory, showing its applications to cryptography.</strong></p> 2023-11-26T12:04:32+00:00 ##submission.copyrightStatement##