
As more people use networks in whatever capacity, security-related issues come up more frequently. These issues could be external to the network or inside to it. To address the security-related issues The science of cryptography and network security makes it possible to protect the resources, data quality, and network infrastructure. Firewalls and filters are utilized across many workstations to safeguard the resources. However, security services are required to safeguard the data during transmission to prevent unauthorized access. To guard against attacks, these services must be changed often. This paper integrates Cycle Leader permutation with Elgamal algorithms to construct such a system. These hybrid solutions can be used to stop hackers from gaining unauthorized access different commercial applications.
Cycle Leader Permutation, Key, Decryption, Encryption, Elgamal
Cycle Leader Permutation, Key, Decryption, Encryption, Elgamal
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
