GPH - International Journal of Mathematics
https://gphjournal.org/index.php/m
<p style="font-family: Aptos;"><strong><span style="color: #222222;"><span style="font-family: 'Aptos', serif;"><span style="aptos: Arial, serif;"><span style="font-size: medium; font-family: 'Aptos', serif;"><span style="color: #000000;">The</span></span></span><span style="aptos: Arial, serif;"><span style="font-size: medium; font-family: 'Aptos', serif;"><span style="color: #000000;"> GPH-INTERNATIONAL JOURNAL OF MATHEMATICS (E-ISSN 2795-3278 P-ISSN 2795-3274) </span></span></span><span style="helvetica: Arial, serif;"><span style="font-size: medium; font-family: 'Book Antiqua', serif;"><span style="color: #000000;">is an open-access journal that publishes research articles, reviews, case studies, guest-edited thematic issues, and short communications/letters in all areas of mathematics, applied mathematics, applied commutative algebra, and algebraic geometry, mathematical biology, physics and engineering, theoretical bioinformatics, experimental mathematics, etc</span></span></span></span></span>.<span style="font-size: medium;"> <a title="Journal Impact Factor" href="http://www.gphjournal.org/index.php/index/jif"><span style="color: #222222;"><span style="font-family: 'Book Antiqua', serif;"><span style="helvetica: Arial, serif;"><span style="color: #000000;"><span style="font-size: 1.5em;"><span style="text-shadow: #FF0000 0px 0px 2px;">Impact Factor: 1.114</span></span></span></span></span></span></a></span></strong></p>GLOBAL PUBLICATION HOUSEen-USGPH - International Journal of Mathematics<p>Author(s) and co-author(s) jointly and severally represent and warrant that the Article is original with the author(s) and does not infringe any copyright or violate any other right of any third parties, and that the Article has not been published elsewhere. Author(s) agree to the terms that the <strong>GPH Journal</strong> will have the full right to remove the published article on any misconduct found in the published article.</p>CRYPTOGRAPHIC ENCRYPTION BASED ON RAIL-FENCE PERMUTATION CIPHER
https://gphjournal.org/index.php/m/article/view/1139
<p><strong>Cryptographic systems play a pivotal role in securing sensitive information in various domains. Permutation ciphers, a fundamental component of classical cryptography, involve the rearrangement of characters in a message to achieve confidentiality. This paper explores the principles and applications of permutation ciphers in cryptographic encryption. The study delves into the historical context, the underlying mechanisms of permutation ciphers, and their relevance in contemporary cryptographic practices. Using permutation on n symbols and Rail Fence Cipher, we construct an algorithm for encrypting and decrypting a message for n = 2, 3</strong></p>Michael N. JohnOgoegbulem OziomaUdoaka Otobong. G.Boniface O. NwalaObi Perpetua Ngozi
##submission.copyrightStatement##
http://creativecommons.org/licenses/by-nc-nd/4.0
2023-11-262023-11-26611010610.5281/zenodo.10209885NUMBER THEORY IN RSA ENCRYPTION SYSTEMS
https://gphjournal.org/index.php/m/article/view/1140
<p><strong>RSA encryption is a widely employed cryptographic system based on the principles of number theory. Number theory is the branch of pure mathematics that studies positive whole numbers, called natural numbers and integers. Number theory seeks to discover relationships existing between numbers. Cryptography is the study of encryption and decryption of information. By encrypting information, data can be transmitted to the intended recipient securely across the internet. In this paper, we propose an RSA encryption scheme based on number theory, showing its applications to cryptography.</strong></p>Michael N. JohnOgoegbulem OziomaObukohwo, VictorHenry Etaroghene Egbogho
##submission.copyrightStatement##
http://creativecommons.org/licenses/by-nc-nd/4.0
2023-11-262023-11-26611071610.5281/zenodo.10209900