https://gphjournal.org/index.php/m/issue/feedGPH - International Journal of Mathematics2023-11-27T11:46:50+00:00Dr. EKEKE, JOHN NDUBUEZEdrekekejohn@gmail.comOpen Journal Systems<p style="font-family: Aptos;"><strong><span style="color: #222222;"><span style="font-family: 'Aptos', serif;"><span style="aptos: Arial, serif;"><span style="font-size: medium; font-family: 'Aptos', serif;"><span style="color: #000000;">The</span></span></span><span style="aptos: Arial, serif;"><span style="font-size: medium; font-family: 'Aptos', serif;"><span style="color: #000000;"> GPH-INTERNATIONAL JOURNAL OF MATHEMATICS (E-ISSN 2795-3278 P-ISSN 2795-3274) </span></span></span><span style="helvetica: Arial, serif;"><span style="font-size: medium; font-family: 'Book Antiqua', serif;"><span style="color: #000000;">is an open-access journal that publishes research articles, reviews, case studies, guest-edited thematic issues, and short communications/letters in all areas of mathematics, applied mathematics, applied commutative algebra, and algebraic geometry, mathematical biology, physics and engineering, theoretical bioinformatics, experimental mathematics, etc</span></span></span></span></span>.<span style="font-size: medium;"> <a title="Journal Impact Factor" href="http://www.gphjournal.org/index.php/index/jif"><span style="color: #222222;"><span style="font-family: 'Book Antiqua', serif;"><span style="helvetica: Arial, serif;"><span style="color: #000000;"><span style="font-size: 1.5em;"><span style="text-shadow: #FF0000 0px 0px 2px;">Impact Factor: 1.114</span></span></span></span></span></span></a></span></strong></p>https://gphjournal.org/index.php/m/article/view/1139CRYPTOGRAPHIC ENCRYPTION BASED ON RAIL-FENCE PERMUTATION CIPHER2023-11-27T11:44:11+00:00Michael N. Johnnoreplygphjournal@gmail.comOgoegbulem Oziomanoreplygphjournal@gmail.comUdoaka Otobong. G.noreplygphjournal@gmail.comBoniface O. Nwalanoreplygphjournal@gmail.comObi Perpetua Ngozinoreplygphjournal@gmail.com<p><strong>Cryptographic systems play a pivotal role in securing sensitive information in various domains. Permutation ciphers, a fundamental component of classical cryptography, involve the rearrangement of characters in a message to achieve confidentiality. This paper explores the principles and applications of permutation ciphers in cryptographic encryption. The study delves into the historical context, the underlying mechanisms of permutation ciphers, and their relevance in contemporary cryptographic practices. Using permutation on n symbols and Rail Fence Cipher, we construct an algorithm for encrypting and decrypting a message for n = 2, 3</strong></p>2023-11-26T00:00:00+00:00##submission.copyrightStatement##https://gphjournal.org/index.php/m/article/view/1140NUMBER THEORY IN RSA ENCRYPTION SYSTEMS2023-11-27T11:46:50+00:00Michael N. Johnstorm4help1@gmail.comOgoegbulem OziomaOzioma.ogoegbulem@dou.edu.ngObukohwo, Victorvictor.obukohwo@dou.edu.ngHenry Etaroghene Egboghoegbogho.henry@dou.edu.ng<p><strong>RSA encryption is a widely employed cryptographic system based on the principles of number theory. Number theory is the branch of pure mathematics that studies positive whole numbers, called natural numbers and integers. Number theory seeks to discover relationships existing between numbers. Cryptography is the study of encryption and decryption of information. By encrypting information, data can be transmitted to the intended recipient securely across the internet. In this paper, we propose an RSA encryption scheme based on number theory, showing its applications to cryptography.</strong></p>2023-11-26T12:04:32+00:00##submission.copyrightStatement##