GPH - International Journal of Mathematics <p style="font-family: Aptos;"><strong><span style="color: #222222;"><span style="font-family: 'Aptos', serif;"><span style="aptos: Arial, serif;"><span style="font-size: medium; font-family: 'Aptos', serif;"><span style="color: #000000;">The</span></span></span><span style="aptos: Arial, serif;"><span style="font-size: medium; font-family: 'Aptos', serif;"><span style="color: #000000;"> GPH-INTERNATIONAL JOURNAL OF MATHEMATICS (E-ISSN 2795-3278 P-ISSN 2795-3274) </span></span></span><span style="helvetica: Arial, serif;"><span style="font-size: medium; font-family: 'Book Antiqua', serif;"><span style="color: #000000;">is an open-access journal that publishes research articles, reviews, case studies, guest-edited thematic issues, and short communications/letters in all areas of mathematics, applied mathematics, applied commutative algebra, and algebraic geometry, mathematical biology, physics and engineering, theoretical bioinformatics, experimental mathematics, etc</span></span></span></span></span>.<span style="font-size: medium;"> <a title="Journal Impact Factor" href=""><span style="color: #222222;"><span style="font-family: 'Book Antiqua', serif;"><span style="helvetica: Arial, serif;"><span style="color: #000000;"><span style="font-size: 1.5em;"><span style="text-shadow: #FF0000 0px 0px 2px;">Impact Factor: 1.114</span></span></span></span></span></span></a></span></strong></p> en-US <p>Author(s) and co-author(s)&nbsp;jointly&nbsp;and severally represent and warrant that the Article is original with the author(s) and does not infringe any&nbsp;copyright or violate any other right of any third parties, and that the Article has not been published&nbsp;elsewhere.&nbsp;Author(s) agree to the terms that the <strong>GPH Journal</strong> will have the full right to remove the published article on any misconduct found in the published article.</p> (Dr. EKEKE, JOHN NDUBUEZE) (Fran) Sun, 26 Nov 2023 11:23:14 +0000 OJS 60 CRYPTOGRAPHIC ENCRYPTION BASED ON RAIL-FENCE PERMUTATION CIPHER <p><strong>Cryptographic systems play a pivotal role in securing sensitive information in various domains. Permutation ciphers, a fundamental component of classical cryptography, involve the rearrangement of characters in a message to achieve confidentiality. This paper explores the principles and applications of permutation ciphers in cryptographic encryption. The study delves into the historical context, the underlying mechanisms of permutation ciphers, and their relevance in contemporary cryptographic practices. Using permutation on n symbols and Rail Fence Cipher, we construct an algorithm for encrypting and decrypting a message for n = 2, 3</strong></p> Michael N. John, Ogoegbulem Ozioma, Udoaka Otobong. G., Boniface O. Nwala, Obi Perpetua Ngozi ##submission.copyrightStatement## Sun, 26 Nov 2023 00:00:00 +0000 NUMBER THEORY IN RSA ENCRYPTION SYSTEMS <p><strong>RSA encryption is a widely employed cryptographic system based on the principles of number theory. Number theory is the branch of pure mathematics that studies positive whole numbers, called natural numbers and integers. Number theory seeks to discover relationships existing between numbers. Cryptography is the study of encryption and decryption of information. By encrypting information, data can be transmitted to the intended recipient securely across the internet. In this paper, we propose an RSA encryption scheme based on number theory, showing its applications to cryptography.</strong></p> Michael N. John, Ogoegbulem Ozioma, Obukohwo, Victor, Henry Etaroghene Egbogho ##submission.copyrightStatement## Sun, 26 Nov 2023 12:04:32 +0000