Article Open Access December 04, 2023

Combined Techniques of Hill Cipher and Transposition Cipher

1
Department of Mathematics, Federal University Birnin Kebbi, Nigeria
2
Department of Computer Science, Federal University Dutse, Nigeria
3
Department of Computer Science, Kebbi State Polytechnic Dakingari, Nigeria
4
Teachers Service Board Sokoto, Nigeria
5
Department of Mathematical Sciences, Federal University Gusau, Nigeria
Page(s): 57-64
Received
September 01, 2023
Revised
November 12, 2023
Accepted
December 02, 2023
Published
December 04, 2023
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.
Copyright: Copyright © The Author(s), 2023. Published by Scientific Publications

Abstract

Encryption is a method of encoding data so that only authorized parties can read or access that data. With the fast improvement of digital data exchange in electronic way, Information Security is becoming much more important in data storage and transmission. In this paper, the authors work on improving the security of data using a combination of Hill cipher and a Transposition cipher (Gp) , the plaintext will be encrypted using ordinary Hill cipher technique and encrypted again using Gp cipher there by producing a more complex ciphertext that will be very difficult for cryptanalyst to intrude, and the decryption process is done in two phases, the first decryption will return the ciphertext of the ordinary Hill cipher method and the second decryption will return the original plaintext.

1. Introduction

Cryptography is the study of secure communications techniques that allow the sender and intended recipient of a message to view its contents. The term is derived from the Greek word kryptos, which means hidden. It is closely associated to encryption, which is the act of scrambling ordinary text into what is known as cipher text and then back upon required which is known as decryption, this is done primarily in two ways, one to change the position of letters or words in a message known as transposition and the other is by substitution of letters by different ones known as substitution respectively, A “substitution” cipher replaces plaintext symbols with other systems to produce cipher text, as a simple example, the plaintext might be “CONGRATULATIONS” when the letters (C,O,N,G,R,A,T,U,L,A,T,I,O,N,S) are replaced (C=E,O=Q,N=P,G=I,R=T,A=C,T=V,I=K,S=U) the text becomes “EQPITCVWVCVKQPU” respectively. With a transposition cipher, we permute the places where the plaintext letters sit. What this means is that we do not change the letters but rather move them around, transpose them, without introducing new letters. Here is a simple illustration. Suppose that we have seven letters in our plaintext, and the following is a permutation that tells us how to move the seven positions around.

Now if we interchange the numbers, then we are getting our cipher text as in

We have the cipher text as “OECWLEM”.

Transposition (permutation) pattern have been used in the past decade to study mathematical structures. For instance [2, 3, 21] and [4] studied the concept of permutation pattern using some elaborate scheme to determine the order of precedence and the position of each of the elements in a finite set of prime size. The science of cryptography can be traced back to 2000BC in Egypt. Subsequently many research on transposition and substitution ciphers were conducted by different researchers such as [11, 13] and [15]. Many discussions on transposition and substitution ciphers were made [5, 7, 9, 12] and [17] evaluates the security of transposition ciphers using stack approaches, [1, 20] and [22] discusses a combination of two independent ciphers for a better securing of a data over a communication channels, [4], [6], [8] and [10] investigated enhancement of Ceaser cipher method, [15] discusses an approaches in improving transpositions cipher systems, [16] on modified Ceaser cipher for a better security situations, Azzam and [18] discusses a strong cipher text by combining Hill and Substitution Ciphers, and [14] on modification of an Affine ciphers algorithm for cryptography password. Cryptographic techniques uses two fundamental systems which are symmetric (secret key) and asymmetric (public key), in this study we use a symmetric key for both encryption and decryption. In 2006, [9] using the concept of Catalan numbers a new scheme of generating function for prime numbers (p ≥ 5) was developed. And furthermore some new studies on the algebraic theoretic properties were been investigated by [19, 20] and [23] the generating function was defined as, w𝐩 = {w1,w2, … ,wp−1} for p ≥ 5such that wi = 11+imp1+ 2imp.. 1 + p-1imp where mp modulop. Many algebraic properties of 𝐆𝐩 were been investigated, and also cryptographic aspect of Gp were been investigated by [2] and [18].

2. Materials and Method

The concept of Hill cipher and Transposition cipher are necessary tools for this study, they were presented in this section.

2.1. Preliminaries

Definition 2.1 Plaintext: - Plaintext is the original text from the sender’s end

Definition 2.2 Cipher: Cipher is a systematic mathematical method for encryption and decryption.

Definition 2.3 Ciphertext: Ciphertext is encrypted text transformed from plaintext using an encryption algorithm

Definition 2.4 Encryption is a process of transforming information that usually are plaintext using an algorithm (known as cipher) to make it unreadable to anyone except those who have the special knowledge known of the key.

Definition 2.5 Decryption: Is the process of converting cipher text to plaintext using a cipher and a key.

Definition 2.6 Key: Is a relatively small piece of information that is used by an algorithm to transform a plaintext into the ciphertext during encryption or a ciphertext into the plaintext during decryption.

Definition 2.7 Modulo arithmetic: A modulo of a number in terms of another number (i.e. a mod b) for a, b integers means that, if a number a is divided by b, it gives another number and a remainder then the remainder is the answer. E.g. If a mod b = r, then it implies that ab = C + r. where C is the answer. E.g. 80 mod 26 = 2. As in [2].

Definition 2.8 Padding: Is the addition of characters in a permutation when the letters are scarce. As in [4].

Definition 2.9 Hill cipher: Hill cipher is a polygraphic substitution cipher based on linear algebra, invented by Lester S. Hill in 1929, to encrypt a message, each block of n letters (n-component vector) is multiplied by an invertible “n x n matrix”, against modulus 26. To decrypt the message, each block is multiplied by the inverse of the matrix used for encryption.

Example. Let the plaintext message be “HELP” and let “K=3325” be the key invertible matrix to be used.

Then, this plaintext is represented by two pairs HE,LP74,1115

  1. Encryption stage of Hill cipher, in encryption, the key multiplies the n-component vectors.

C=KP, where K is key, P is plaintext and C is the resulting plaintext.

Then we compute 33257478mod26and  33251115019(mod26)

Then, 78,019 HI,AT the ciphertext of “HELP = HIAT”

  1. Decryption stage of Hill cipher, in decryption, inverse key multiplies n-component vectors.

P=K-1C where P is the resulting plaintext, k-1 is the inverse key matrix and C is the cipher text

Then, 3325-11517209(mod26) and HIAT HI,AT78,019

Then we compute 15172097874(mod26) and 15172090191115(mod26)

Therefore, 74,1115HE,LPHELP. The receiver of the message can now read the cipher text HIAT as HELP.

Definition 2.10 Cryptanalysis: Is the study of principles and methods of transforming an unintelligible message back into an intelligible message without knowledge of the key, sometimes using frequency analysis of the alphabets as in the table below.

Definition 2.11 Let Ω be a non-empty ordered set such that Ω ⊂ N. Let Gp = {wi: 1≤i≤p-1} be a subgroup of symmetry group Sn, such that every ωi is generated by arbitrary set Ω for any prime p ≥ 5. That means Gp = {w1, w2, w3, --- wp-1} be structure such that each wi is generated from the arbitrary set w for any primep5, using the scheme below:

wi = 11+imp1+ 2imp.. 1 + p-1imp

Then each wi is called a cycle and the elements in each wi are distinct and called successors.

When p = 5, we have:

G5 = w1, w2, w3, w4,  G5={12345,13524,14253,(15432)}

Definition 2.12 Transposition cipher (Gp): Transposition cipher is a method of encryption which scrambles the position of characters without changing the characters themselves.

Encryption on 𝐺𝑃

Since 𝑮𝑃 = (1,2, 𝜔3, …, 𝜔𝑝−1) then for the encryption process we can define a relation:

C: ω(1+i)

Where i< p-1 Where 𝜔1= P, and P is called a plaintext.

Decryption On 𝐺𝑃

Since 𝑮 = (1, 𝜔2, 𝜔3, …, 𝜔𝑝−1) then for the decryption process we have:

P:(1+i)ω1

Definition 2.13 Modulo Inverse: In a modular arithmetic a number ‘’a’’ has a modular inverse a-1 for a number m, if (a.a-1) modm = 1, The table below shows all the possible modular inverses of mod26.

E.g. The modular inverse of 9 is 3 since 9x3 = 27 and 27 mod26 = 1.

Definition 2.14 Inverse Matrix: The inverse K-1 of a matrix K is defined by the equation: KK-1 =K-1 K= I, where I is an “n x n” square identity matrix.

3. Result

Encryption and decryption processes will take place through two processes. In the encryption process, the plaintext will be encrypted twice with the Hill cipher and Transposition cipher (Gp) algorithm, different keys will be used for the two encryptions because the two algorithms are different and also in order to make the cipher text more secure from attackers. So different plaintext, different keys.

𝐂𝐢 ≔ Multiple cipher texts.

The encryption process will take the following steps.

  1. Apply encryption function of the Hill cipher on the plaintext (P) to produce cipher text (C1).
  2. Apply encryption function of Gp on C1 to produce C2, where C2 is the ciphertext sent to the receiver.

The decryption process will use the following steps.

  1. Apply the decryption function of Gp on C2 to produce first ciphertext (C1).
  2. Apply Hill decryption function on C1 to produce the original text (plaintext)

Example. Encrypt the message “safe messages” using the key “ciphering”

3.1. Encryption Statge
  • We encrypt the text using Hill cipher. The key is “ciphering”, plaintext should be converted into column vectors of length 3.

matrices, which is equivalent to safemessages, where

, and the key ciphering is ciphering=281574178136,

The encryption is given by C1 = K P.

2815741781361805mod26=7318=HDS,
28157417813614124mod26=8144=IOE
28157417813618180mod26=241614=YQO
2815741781366418mod26=200=CAA

The cipher text is C1=HDSIOEYQOCAA.

  • We encrypt the C1=HDSIOEYQOCAA using Gp where number of letters is 12 but p is always prime, then we pad the C1with a padding letter X, now C1*=HDSIOEYQOCAAX.

𝑮13 =(1,𝜔2,𝜔3,…, 𝜔12), and w1is given below by the table.

Let key =1, then we have. w1w(1+k)and k=1, then, we have w1w2, and w2 is a transposition, given by the table below using the scheme of definition 2.1.11 for wi.

Then, C2 = HSOYOAXDIEQCA, the intended receiver and the intruder will receive C2 as the message, and then decryption will be performed to get the original message sent.

3.2. Decryption Stage.
  • We decrypt the code by using Gp cipher decryption using k=1, as shown method below.
  • w1+kw1+k-k
    w2w2-1
    w1

And w1 is given in table 3 above,

  • We decrypt the code "HDSIOEYQOCAAX"using Hill cipher decryption algorithm :

P = K-1C where C = C1= HDSIOEYQOCAAX, and k is the key.

k=281574178136and K-1 =281574178136-1mod26=371626179820

Therefore, "HDSIOEYQOCAAX" will be written in n-component vectors as

HDS=7318,IOE=8144,YQO=241614,CAA=200

Where X is a padded later to be ignored. Then,

3716261798207318mod26=1805=saf
3716261798208144mod26=4124=eme
371626179820241614mod26=18180=ssa
371626179820200mod26=6418=ges

P = safemessages, after paraphrasing we have “safe messages”, the process of decryption is now complete.

4. Discussion and Conclusion

The idea of using transposition on Gp was first proposed by [1] and [7] considering security features of transposition cipher which include being more simple to decipher for the intended recipient and very difficult for the unintended recipient of the message and therefore it provides higher level of security to the data being sent over communication channels, and also the Hill cipher is a digraph in nature but can expand to multiply any size of letters, adding more complexity and reliability for better security of the information sent. And finally, the authors discovered that, combination of Hill and transposition gives a cipher text that is somehow impossible for the attackers to get the original message due to multiple algorithms applied there by providing a more complicated cipher text for the intruders.

Hill cipher and transposition cipher (Gp) were been studied individually and their combination give more secure ciphertext than in their ordinary form and cryptanalysis fails due to multiple algorithms employed in the study.

Acknowledgement

We would like to express our gratitude to all of the staff of UDUSOK and FUBK Mathematics Department for their immense support in the development of this manuscript for their guidance and contribution in finishing this manuscript.

Author Contributions

Conception and design: Hassan, A., and Sani, S. Drafting of the manuscript: Hassan, A and Sani, S. Revision of the manuscript: Abdullahi, U and Sahalu, S. S. Critical Revision of the manuscript: all authors. All authors read and approved the final version of the manuscript.

References

  1. Alhassan, M. J; Hassan, A; Sani, S. and Alhassan, Y. (2021). A Combined Technique of an Affine Cipher and Transposition Cipher Quest Journals Journal of Research in Applied Mathematics Volume 7. Issue 10 (2021) pp: 08-12
  2. Audu M.S. (1986), Generating Sets for Transitive Permutation groups of prime-power order. The Journal of Mathematical Association of Nigeria Abacus, 17(2), 22-26.
  3. Azzam A and Sumarsono (2017), A Modifying of Hill Cipher Algorithm with 3 Substitution Ceaser Cipher. Proceedings International Conference of Science and Engineering, Indonesia.1: 157-163.[CrossRef]
  4. Fahrul I, K., Hassan F, S., Toras P and Rahmat W. (2017), Combination of Ceaser Cipher Modification with Transposition Cipher. Advances in Science Technology and Engineering Systems Journal. 2(5): 22-25.[CrossRef]
  5. Garba A. I, Yusuf A and Hassan A. (2018), Some Topological Properties of a Constructed Algebraic Structure. Journal of the Nigerian Association of Mathematical Physics, 45:21-26
  6. Garba A. I, Zakari, Y. and Hassan, A. (2019), on the fuzzy nature of constructed algebraic structure Gp. Bayero Journal of Pure and applied sciences, 12(1):146-150[CrossRef]
  7. Hassan, A; Alhassan, M. J; Alhassan, Y. and Sani, S. (2021). Cryptography as a Solution for a Better Security International Journal of Advances in Engineering and Management (IJAEM :3(12). pp: 849-853
  8. https://www3.nd.edu/~busiforc/handouts/cryptography/letterfrequencies.html
  9. Ibrahim A. A. (2006), Correspondence between the Length of some Class of Permutation patterns and Primitive Elements of Automophism Group modulo n, Abacus. The Journal of mathematical Association of Nigeria, 33:143-154.
  10. Kuriakkottu A. R. (2021). Use of Transposition Cipher and its Types. International Journal of Research and Engineering, Science and Management 4(11), 164-165
  11. Kashish G and Supriya K. (2013) Modified Ceaser Cipher for a Better Security Enhancement. International Journal of Computer Application.73:26-31[CrossRef]
  12. Mishra A. (2013), Enhancing security of Ceaser cipher using different methods. International Journal of Research in Engineering and Technology 2(09):327-332.[CrossRef]
  13. Massoud S., Sokouti B. and Saeid P. (2009), An Approach in Improving Transposition cipher System. Indian Journal of Science and Technology.2(8):9-15.[CrossRef]
  14. Pooja S and Pintu S. (2017), Enhancing security of Ceaser cipher using “Divide and Conquer Approach”. International Journal of Advance Research in Science and Engineering. 06(02):144-150.
  15. Rajput Y., Naik D. and Mane C. (2014), An improved cryptographic technique to encrypt Text message using double encryption. International Journal of Computer Applications86(6):24-28.[CrossRef]
  16. Sriramoju Ajay Babu. (2017), modification affine ciphers algorithm for cryptography password, Programmer Analyst, Randstad Technologies, EQT Plaza 625 Liberty Avenue, Suite 1020, Pittsburgh, Pennsylvania -15222, USA.
  17. Shahid B. D. (2014), enhancing the security of Ceaser cipher using double substitution method. International Journal of Computer Science and Engineering Technology.5:772-774.
  18. M. S. Magami and A. A. Ibrahim (2011). Construction of Association Scheme using some (123) – avoiding class of Aunu patterns. Nigerian Journals of Basic & Applied Sciences (NJBAS). 19(1), 5-8. ISSN 0794-5698. (Index)[CrossRef]
  19. Usman. A. and Magami M. S. (2015). An Analysis of Group Theoretic Properties of a Class of (123)- avoiding Pattern of Aunu Numbers Using Thin Cyclic Design. Mathematical Theory and Modeling. 5(5) 45-48. ISSN (Paper) 2224-5804 ISSN (Online) 2225-0522DOI: 10.7176/MTM[CrossRef]
  20. M. S. Magami, O. U. Amama, A. I. Garba, (2022). Construction of Vector Space Using Permutation Patterns. Journal of the Mathematical Association of Nigeria. Abacus (Mathematics Science Series) 49(2) 147-153.
  21. S. M. Magami and S. U. Ashafa. (2023). Some parameters of commuting graph of a Multigroups. Far East Journal of Applied Mathematics Pushpa Publishing House, Prayagraj, India http://www.pphmj.comhttp://dx.doi.org/10.17654/0972096023005116 (1), 61-71 P-ISSN: 0972-0960
  22. Magami M. S. and Ibrahim M. (2021). Partition block coordinate statistics on non-deranged permutation. Journal of Research in Applied Mathematics, 7(9) 28-33. ISSN (Online):2394-0743: ISSN(Print): 2394-0735 (Index)
  23. Magami M. S. and Ibrahim M. (2021). “Admissible Inversion on non-deranged permutations” Asian Research Journal of Mathematics. ISSN: 2456-477X DOI:10.9734/ARJOM/2021/v17i830322[CrossRef]
Article metrics
Views
1396
Downloads
259

Cite This Article

APA Style
Hassan, A. , Hassan, A. Garko, A. , Garko, A. Sani, S. , Sani, S. Abdullahi, U. , & Abdullahi, U. (2023). Combined Techniques of Hill Cipher and Transposition Cipher. Journal of Mathematics Letters, 1(1), 57-64. https://doi.org/10.31586/jml.2023.822
ACS Style
Hassan, A. ; Hassan, A. Garko, A. ; Garko, A. Sani, S. ; Sani, S. Abdullahi, U. ; Abdullahi, U. Combined Techniques of Hill Cipher and Transposition Cipher. Journal of Mathematics Letters 2023 1(1), 57-64. https://doi.org/10.31586/jml.2023.822
Chicago/Turabian Style
Hassan, A., A. Hassan. A. Garko, A. Garko. S. Sani, S. Sani. U. Abdullahi, and U. Abdullahi. 2023. "Combined Techniques of Hill Cipher and Transposition Cipher". Journal of Mathematics Letters 1, no. 1: 57-64. https://doi.org/10.31586/jml.2023.822
AMA Style
Hassan A, Hassan AGarko A, Garko ASani S, Sani SAbdullahi U, Abdullahi U. Combined Techniques of Hill Cipher and Transposition Cipher. Journal of Mathematics Letters. 2023; 1(1):57-64. https://doi.org/10.31586/jml.2023.822
@Article{jml822,
AUTHOR = {Hassan, A. and Garko, A. and Sani, S. and Abdullahi, U. and Sahalu, S.},
TITLE = {Combined Techniques of Hill Cipher and Transposition Cipher},
JOURNAL = {Journal of Mathematics Letters},
VOLUME = {1},
YEAR = {2023},
NUMBER = {1},
PAGES = {57-64},
URL = {https://www.scipublications.com/journal/index.php/JML/article/view/822},
ISSN = {ISSN Pending},
DOI = {10.31586/jml.2023.822},
ABSTRACT = {Encryption is a method of encoding data so that only authorized parties can read or access that data. With the fast improvement of digital data exchange in electronic way, Information Security is becoming much more important in data storage and transmission. In this paper, the authors work on improving the security of data using a combination of Hill cipher and a Transposition cipher (Gp) , the plaintext will be encrypted using ordinary Hill cipher technique and encrypted again using Gp cipher there by producing a more complex ciphertext that will be very difficult for cryptanalyst to intrude, and the decryption process is done in two phases, the first decryption will return the ciphertext of the ordinary Hill cipher method and the second decryption will return the original plaintext.},
}
%0 Journal Article
%A Hassan, A.
%A Garko, A.
%A Sani, S.
%A Abdullahi, U.
%A Sahalu, S.
%D 2023
%J Journal of Mathematics Letters

%@ ISSN Pending
%V 1
%N 1
%P 57-64

%T Combined Techniques of Hill Cipher and Transposition Cipher
%M doi:10.31586/jml.2023.822
%U https://www.scipublications.com/journal/index.php/JML/article/view/822
TY  - JOUR
AU  - Hassan, A.
AU  - Garko, A.
AU  - Sani, S.
AU  - Abdullahi, U.
AU  - Sahalu, S.
TI  - Combined Techniques of Hill Cipher and Transposition Cipher
T2  - Journal of Mathematics Letters
PY  - 2023
VL  - 1
IS  - 1
SN  - ISSN Pending
SP  - 57
EP  - 64
UR  - https://www.scipublications.com/journal/index.php/JML/article/view/822
AB  - Encryption is a method of encoding data so that only authorized parties can read or access that data. With the fast improvement of digital data exchange in electronic way, Information Security is becoming much more important in data storage and transmission. In this paper, the authors work on improving the security of data using a combination of Hill cipher and a Transposition cipher (Gp) , the plaintext will be encrypted using ordinary Hill cipher technique and encrypted again using Gp cipher there by producing a more complex ciphertext that will be very difficult for cryptanalyst to intrude, and the decryption process is done in two phases, the first decryption will return the ciphertext of the ordinary Hill cipher method and the second decryption will return the original plaintext.
DO  - Combined Techniques of Hill Cipher and Transposition Cipher
TI  - 10.31586/jml.2023.822
ER  - 
  1. Alhassan, M. J; Hassan, A; Sani, S. and Alhassan, Y. (2021). A Combined Technique of an Affine Cipher and Transposition Cipher Quest Journals Journal of Research in Applied Mathematics Volume 7. Issue 10 (2021) pp: 08-12
  2. Audu M.S. (1986), Generating Sets for Transitive Permutation groups of prime-power order. The Journal of Mathematical Association of Nigeria Abacus, 17(2), 22-26.
  3. Azzam A and Sumarsono (2017), A Modifying of Hill Cipher Algorithm with 3 Substitution Ceaser Cipher. Proceedings International Conference of Science and Engineering, Indonesia.1: 157-163.[CrossRef]
  4. Fahrul I, K., Hassan F, S., Toras P and Rahmat W. (2017), Combination of Ceaser Cipher Modification with Transposition Cipher. Advances in Science Technology and Engineering Systems Journal. 2(5): 22-25.[CrossRef]
  5. Garba A. I, Yusuf A and Hassan A. (2018), Some Topological Properties of a Constructed Algebraic Structure. Journal of the Nigerian Association of Mathematical Physics, 45:21-26
  6. Garba A. I, Zakari, Y. and Hassan, A. (2019), on the fuzzy nature of constructed algebraic structure. Bayero Journal of Pure and applied sciences, 12(1):146-150[CrossRef]
  7. Hassan, A; Alhassan, M. J; Alhassan, Y. and Sani, S. (2021). Cryptography as a Solution for a Better Security International Journal of Advances in Engineering and Management (IJAEM :3(12). pp: 849-853
  8. https://www3.nd.edu/~busiforc/handouts/cryptography/letterfrequencies.html
  9. Ibrahim A. A. (2006), Correspondence between the Length of some Class of Permutation patterns and Primitive Elements of Automophism Group modulo n, Abacus. The Journal of mathematical Association of Nigeria, 33:143-154.
  10. Kuriakkottu A. R. (2021). Use of Transposition Cipher and its Types. International Journal of Research and Engineering, Science and Management 4(11), 164-165
  11. Kashish G and Supriya K. (2013) Modified Ceaser Cipher for a Better Security Enhancement. International Journal of Computer Application.73:26-31[CrossRef]
  12. Mishra A. (2013), Enhancing security of Ceaser cipher using different methods. International Journal of Research in Engineering and Technology 2(09):327-332.[CrossRef]
  13. Massoud S., Sokouti B. and Saeid P. (2009), An Approach in Improving Transposition cipher System. Indian Journal of Science and Technology.2(8):9-15.[CrossRef]
  14. Pooja S and Pintu S. (2017), Enhancing security of Ceaser cipher using “Divide and Conquer Approach”. International Journal of Advance Research in Science and Engineering. 06(02):144-150.
  15. Rajput Y., Naik D. and Mane C. (2014), An improved cryptographic technique to encrypt Text message using double encryption. International Journal of Computer Applications86(6):24-28.[CrossRef]
  16. Sriramoju Ajay Babu. (2017), modification affine ciphers algorithm for cryptography password, Programmer Analyst, Randstad Technologies, EQT Plaza 625 Liberty Avenue, Suite 1020, Pittsburgh, Pennsylvania -15222, USA.
  17. Shahid B. D. (2014), enhancing the security of Ceaser cipher using double substitution method. International Journal of Computer Science and Engineering Technology.5:772-774.
  18. M. S. Magami and A. A. Ibrahim (2011). Construction of Association Scheme using some (123) – avoiding class of Aunu patterns. Nigerian Journals of Basic & Applied Sciences (NJBAS). 19(1), 5-8. ISSN 0794-5698. (Index)[CrossRef]
  19. Usman. A. and Magami M. S. (2015). An Analysis of Group Theoretic Properties of a Class of (123)- avoiding Pattern of Aunu Numbers Using Thin Cyclic Design. Mathematical Theory and Modeling. 5(5) 45-48. ISSN (Paper) 2224-5804 ISSN (Online) 2225-0522DOI: 10.7176/MTM[CrossRef]
  20. M. S. Magami, O. U. Amama, A. I. Garba, (2022). Construction of Vector Space Using Permutation Patterns. Journal of the Mathematical Association of Nigeria. Abacus (Mathematics Science Series) 49(2) 147-153.
  21. S. M. Magami and S. U. Ashafa. (2023). Some parameters of commuting graph of a Multigroups. Far East Journal of Applied Mathematics Pushpa Publishing House, Prayagraj, India http://www.pphmj.comhttp://dx.doi.org/10.17654/0972096023005116 (1), 61-71 P-ISSN: 0972-0960
  22. Magami M. S. and Ibrahim M. (2021). Partition block coordinate statistics on non-deranged permutation. Journal of Research in Applied Mathematics, 7(9) 28-33. ISSN (Online):2394-0743: ISSN(Print): 2394-0735 (Index)
  23. Magami M. S. and Ibrahim M. (2021). “Admissible Inversion on non-deranged permutations” Asian Research Journal of Mathematics. ISSN: 2456-477X DOI:10.9734/ARJOM/2021/v17i830322[CrossRef]