﻿<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD with MathML3 v1.2 20190208//EN" "http://dtd.nlm.nih.gov/publishing/3.0/journalpublishing3.dtd">
<article
    xmlns:mml="http://www.w3.org/1998/Math/MathML"
    xmlns:xlink="http://www.w3.org/1999/xlink" dtd-version="3.0" xml:lang="en" article-type="article">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JML</journal-id>
      <journal-title-group>
        <journal-title>Journal of Mathematics Letters</journal-title>
      </journal-title-group>
      <issn pub-type="epub"></issn>
      <issn pub-type="ppub"></issn>
      <publisher>
        <publisher-name>Science Publications</publisher-name>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.31586/jml.2023.822</article-id>
      <article-id pub-id-type="publisher-id">JML-822</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Article</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>
          Combined Techniques of Hill Cipher and Transposition Cipher
        </article-title>
      </title-group>
      <contrib-group>
<contrib contrib-type="author">
<name>
<surname>Hassan</surname>
<given-names>A.</given-names>
</name>
<xref rid="af1" ref-type="aff">1</xref>
<xref rid="cr1" ref-type="corresp">*</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Garko</surname>
<given-names>A.</given-names>
</name>
<xref rid="af2" ref-type="aff">2</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Sani</surname>
<given-names>S.</given-names>
</name>
<xref rid="af3" ref-type="aff">3</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Abdullahi</surname>
<given-names>U.</given-names>
</name>
<xref rid="af4" ref-type="aff">4</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Sahalu</surname>
<given-names>S.</given-names>
</name>
<xref rid="af5" ref-type="aff">5</xref>
</contrib>
      </contrib-group>
<aff id="af1"><label>1</label> Department of Mathematics, Federal University Birnin Kebbi, Nigeria</aff>
<aff id="af2"><label>2</label> Department of Computer Science, Federal University Dutse</aff>
<aff id="af3"><label>3</label> Department of Computer Science Kebbi State Polytechnic Dakingari</aff>
<aff id="af4"><label>4</label> Teachers Service Board Sokoto, Nigeria</aff>
<aff id="af5"><label>5</label> Department of Mathematical Sciences, Federal University Gusau, Nigeria</aff>
<author-notes>
<corresp id="c1">
<label>*</label>Corresponding author at: Department of Mathematics, Federal University Birnin Kebbi, Nigeria
</corresp>
</author-notes>
      <pub-date pub-type="epub">
        <day>04</day>
        <month>12</month>
        <year>2023</year>
      </pub-date>
      <volume>1</volume>
      <issue>1</issue>
      <history>
        <date date-type="received">
          <day>01</day>
          <month>09</month>
          <year>2023</year>
        </date>
        <date date-type="rev-recd">
          <day>12</day>
          <month>11</month>
          <year>2023</year>
        </date>
        <date date-type="accepted">
          <day>02</day>
          <month>12</month>
          <year>2023</year>
        </date>
        <date date-type="pub">
          <day>04</day>
          <month>12</month>
          <year>2023</year>
        </date>
      </history>
      <permissions>
        <copyright-statement>&#xa9; Copyright 2023 by authors and Trend Research Publishing Inc. </copyright-statement>
        <copyright-year>2023</copyright-year>
        <license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/4.0/">
          <license-p>This work is licensed under the Creative Commons Attribution International License (CC BY). http://creativecommons.org/licenses/by/4.0/</license-p>
        </license>
      </permissions>
      <abstract>
        Encryption is a method of encoding data so that only authorized parties can read or access that data. With the fast improvement of digital data exchange in electronic way, Information Security is becoming much more important in data storage and transmission. In this paper, the authors work on improving the security of data using a combination of Hill cipher and a Transposition cipher (<bold>G</bold>&lt;SUB><bold>p</bold>&lt;/SUB>) , the plaintext will be encrypted using ordinary Hill cipher technique and encrypted again using <bold>G</bold>&lt;SUB><bold>p</bold>&lt;/SUB>&lt;SUB><bold> </bold>&lt;/SUB>cipher there by producing a more complex ciphertext that will be very difficult for cryptanalyst to intrude, and the decryption process is done in two phases, the first decryption will return the ciphertext of the ordinary Hill cipher method and the second decryption will return the original plaintext.
      </abstract>
      <kwd-group>
        <kwd-group><kwd>Encryption</kwd>
<kwd>Decryption</kwd>
<kwd>Plaintext</kwd>
<kwd>Cipher</kwd>
<kwd>Permutation</kwd>
<kwd>Cryptanalyst</kwd>
<kwd>Hill Cipher</kwd>
</kwd-group>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec1">
<title>Introduction</title><p>Cryptography is the study of secure communications techniques that allow the sender and intended recipient of a message to view its contents. The term is derived from the Greek word kryptos, which means hidden. It is closely associated to encryption, which is the act of scrambling ordinary text into what is known as cipher text and then back upon required which is known as decryption, this is done primarily in two ways, one to change the position of letters or words in a message known as transposition and the other is by substitution of letters by different ones known as substitution respectively, A &#x26;#x0201c;substitution&#x26;#x0201d; cipher replaces plaintext symbols with other systems to produce cipher text, as a simple example, the plaintext might be &#x26;#x0201c;CONGRATULATIONS&#x26;#x0201d; when the letters (C,O,N,G,R,A,T,U,L,A,T,I,O,N,S) are replaced (C=E,O=Q,N=P,G=I,R=T,A=C,T=V,I=K,S=U) the text becomes &#x26;#x0201c;EQPITCVWVCVKQPU&#x26;#x0201d; respectively. With a transposition cipher, we permute the places where the plaintext letters sit. What this means is that we do not change the letters but rather move them around, transpose them, without introducing new letters. Here is a simple illustration. Suppose that we have seven letters in our plaintext, and the following is a permutation that tells us how to move the seven positions around.</p>
<p></p>
<p></p>
<p>Now if we interchange the numbers, then we are getting our cipher text as in </p>
<p></p>
<p></p>
<p>We have the cipher text as &#x26;#x0201c;OECWLEM&#x26;#x0201d;.</p>
<p>Transposition (permutation) pattern have been used in the past decade to study mathematical structures. For instance [
<xref ref-type="bibr" rid="R2">2</xref>,<xref ref-type="bibr" rid="R3">3</xref>,<xref ref-type="bibr" rid="R21">21</xref>] and [
<xref ref-type="bibr" rid="R4">4</xref>] studied the concept of permutation pattern using some elaborate scheme to determine the order of precedence and the position of each of the elements in a finite set of prime size. The science of cryptography can be traced back to 2000BC in Egypt. Subsequently many research on transposition and substitution ciphers were conducted by different researchers such as [
<xref ref-type="bibr" rid="R11">11</xref>,<xref ref-type="bibr" rid="R13">13</xref>] and [
<xref ref-type="bibr" rid="R15">15</xref>]. Many discussions on transposition and substitution ciphers were made [
<xref ref-type="bibr" rid="R5">5</xref>,<xref ref-type="bibr" rid="R7">7</xref>,<xref ref-type="bibr" rid="R9">9</xref>,<xref ref-type="bibr" rid="R12">12</xref>] and [
<xref ref-type="bibr" rid="R17">17</xref>] evaluates the security of transposition ciphers using stack approaches, [
<xref ref-type="bibr" rid="R1">1</xref>,<xref ref-type="bibr" rid="R20">20</xref>] and [
<xref ref-type="bibr" rid="R22">22</xref>] discusses a combination of two independent ciphers for a better securing of a data over a communication channels, [
<xref ref-type="bibr" rid="R4">4</xref>], [6], [8] and [
<xref ref-type="bibr" rid="R10">10</xref>] investigated enhancement of Ceaser cipher method, [
<xref ref-type="bibr" rid="R15">15</xref>] discusses an approaches in improving transpositions cipher systems, [
<xref ref-type="bibr" rid="R16">16</xref>] on modified Ceaser cipher for a better security situations, Azzam and [
<xref ref-type="bibr" rid="R18">18</xref>] discusses a strong cipher text by combining  Hill and Substitution Ciphers, and [
<xref ref-type="bibr" rid="R14">14</xref>] on modification of an Affine ciphers algorithm for cryptography password. Cryptographic techniques uses two fundamental systems which are symmetric (secret key) and asymmetric (public key), in this study we use a symmetric key for both encryption and decryption. In 2006, [
<xref ref-type="bibr" rid="R9">9</xref>] using the concept of Catalan numbers a new scheme of generating function for prime numbers (p &#x26;#x02265; 5) was developed. And furthermore some new studies on the algebraic theoretic properties were been investigated by [
<xref ref-type="bibr" rid="R19">19</xref>,<xref ref-type="bibr" rid="R20">20</xref>] and [
<xref ref-type="bibr" rid="R23">23</xref>] the generating function was defined as, w<sub>&#x26;#x0d835;&#x26;#x0dc29;</sub> = {w<sub>1</sub>,w<sub>2</sub>, &#x26;#x02026; ,w<sub>p&#x26;#x02212;1</sub>} for p &#x26;#x02265; 5such that <math><semantics><mrow><msub><mrow><mi>w</mi></mrow><mrow><mi>i</mi></mrow></msub><mi> </mi><mo>=</mo><mi> </mi><mfenced separators="|"><mrow><mfenced separators="|"><mrow><mn>1</mn></mrow></mfenced><mfenced separators="|"><mrow><mn>1</mn><mo>+</mo><mi>i</mi></mrow></mfenced><mi>m</mi><mi>p</mi><mfenced separators="|"><mrow><mn>1</mn><mo>+</mo><mi> </mi><mn>2</mn><mi>i</mi></mrow></mfenced><mi>m</mi><mi>p</mi><mo>…</mo><mo>.</mo><mo>.</mo><mi> </mi><mfenced separators="|"><mrow><mn>1</mn><mi> </mi><mo>+</mo><mi> </mi><mfenced separators="|"><mrow><mi>p</mi><mo>-</mo><mn>1</mn></mrow></mfenced><mi>i</mi></mrow></mfenced><mi>m</mi><mi>p</mi></mrow></mfenced></mrow></semantics></math> where <bold>mp</bold><bold> </bold><bold>&#x26;#x02254;</bold><bold> </bold><bold>modulop</bold>. Many algebraic properties of &#x26;#x0d835;&#x26;#x0dc06;<sub>&#x26;#x0d835;&#x26;#x0dc29;</sub> were been investigated, and also cryptographic aspect of <bold>G</bold><sub><bold>p</bold></sub> were been investigated by [
<xref ref-type="bibr" rid="R2">2</xref>] and [
<xref ref-type="bibr" rid="R18">18</xref>].</p>
</sec><sec id="sec2">
<title>Materials and Method</title><p>The concept of Hill cipher and Transposition cipher are necessary tools for this study, they were presented in this section.</p>
<title>2.1. Preliminaries</title><p><bold>Definition 2.1 </bold>Plaintext: - Plaintext is the original text from the sender&#x26;#x02019;s end</p>
<p><bold>Definition 2.2</bold> Cipher: Cipher is a systematic mathematical method for encryption and decryption.</p>
<p><bold>Definition 2.3</bold> Ciphertext: Ciphertext is encrypted text transformed from plaintext using an encryption algorithm</p>
<p><bold>Definition 2.4 </bold>Encryption is a process of transforming information that usually are plaintext using an algorithm (known as cipher) to make it unreadable to anyone except those who have the special knowledge known of the key.</p>
<p><bold>Definition 2.5 </bold>Decryption: Is the process of converting cipher text to plaintext using a cipher and a key.</p>
<p><bold>Definition 2.6 </bold>Key: Is a relatively small piece of information that is used by an algorithm to transform a plaintext into the ciphertext during encryption or a ciphertext into the plaintext during decryption.</p>
<p><bold>Definition 2.7 Modulo arithmetic:</bold>  A modulo of a number in terms of another number (i.e. a mod b) for a, b integers means that, if a number a is divided by b, it gives another number and a remainder then the remainder is the answer. E.g. If a mod b = r, then it implies that ab = C + r. where C is the answer. E.g. 80 mod 26 = 2. As in [
<xref ref-type="bibr" rid="R2">2</xref>].</p>
<p><bold>Definition 2.8 </bold>Padding: Is the addition of characters in a permutation when the letters are scarce. As in [
<xref ref-type="bibr" rid="R4">4</xref>].</p>
<p><bold>Definition 2.9</bold> Hill cipher: Hill cipher is a polygraphic substitution cipher based on linear algebra, invented by Lester S. Hill in 1929, to encrypt a message, each block of n letters (n-component vector) is multiplied by an invertible &#x26;#x0201c;n x n matrix&#x26;#x0201d;, against modulus 26. To decrypt the message, each block is multiplied by the inverse of the matrix used for encryption. </p>
<p>Example. Let the plaintext message be &#x26;#x0201c;HELP&#x26;#x0201d; and let &#x26;#x0201c;<math><semantics><mrow><mi>K</mi><mo>=</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>3</mn></mtd><mtd><mn>3</mn></mtd></mtr><mtr><mtd><mn>2</mn></mtd><mtd><mn>5</mn></mtd></mtr></mtable></mrow></mfenced></mrow></semantics></math>&#x26;#x0201d; be the key invertible matrix to be used. </p>
<p>Then, this plaintext is represented by two pairs <math><semantics><mrow><mfenced separators="|"><mrow><mtable><mtr><mtd><mi>H</mi></mtd></mtr><mtr><mtd><mi>E</mi></mtd></mtr></mtable></mrow></mfenced><mo>,</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mi>L</mi></mtd></mtr><mtr><mtd><mi>P</mi></mtd></mtr></mtable></mrow></mfenced><mo>→</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>7</mn></mtd></mtr><mtr><mtd><mn>4</mn></mtd></mtr></mtable></mrow></mfenced><mo>,</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>11</mn></mtd></mtr><mtr><mtd><mn>15</mn></mtd></mtr></mtable></mrow></mfenced></mrow></semantics></math></p>
<p>Encryption stage of Hill cipher, in encryption, the key multiplies the n-component vectors.</p>
<p>C=KP, where K is key, P is plaintext and C is the resulting plaintext. </p>
<p>Then we compute <math><semantics><mrow><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>3</mn></mtd><mtd><mn>3</mn></mtd></mtr><mtr><mtd><mn>2</mn></mtd><mtd><mn>5</mn></mtd></mtr></mtable></mrow></mfenced><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>7</mn></mtd></mtr><mtr><mtd><mn>4</mn></mtd></mtr></mtable></mrow></mfenced><mo>≡</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>7</mn></mtd></mtr><mtr><mtd><mn>8</mn></mtd></mtr></mtable></mrow></mfenced><mfenced separators="|"><mrow><mi>m</mi><mi>o</mi><mi>d</mi><mn>26</mn></mrow></mfenced><mi>a</mi><mi>n</mi><mi>d</mi><mi> </mi><mi> </mi><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>3</mn></mtd><mtd><mn>3</mn></mtd></mtr><mtr><mtd><mn>2</mn></mtd><mtd><mn>5</mn></mtd></mtr></mtable></mrow></mfenced><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>11</mn></mtd></mtr><mtr><mtd><mn>15</mn></mtd></mtr></mtable></mrow></mfenced><mo>≡</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>0</mn></mtd></mtr><mtr><mtd><mn>19</mn></mtd></mtr></mtable></mrow></mfenced><mo>(</mo><mi>m</mi><mi>o</mi><mi>d</mi><mn>26</mn><mo>)</mo></mrow></semantics></math></p>
<p>Then, <math><semantics><mrow><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>7</mn></mtd></mtr><mtr><mtd><mn>8</mn></mtd></mtr></mtable></mrow></mfenced><mo>,</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>0</mn></mtd></mtr><mtr><mtd><mn>19</mn></mtd></mtr></mtable></mrow></mfenced><mi> </mi><mo>→</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mi>H</mi></mtd></mtr><mtr><mtd><mi>I</mi></mtd></mtr></mtable></mrow></mfenced><mo>,</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mi>A</mi></mtd></mtr><mtr><mtd><mi>T</mi></mtd></mtr></mtable></mrow></mfenced></mrow></semantics></math> the ciphertext of &#x26;#x0201c;HELP = HIAT&#x26;#x0201d; </p>
<p>Decryption stage of Hill cipher, in decryption, inverse key multiplies n-component vectors.</p>
<p>P=K<sup>-1</sup>C where P is the resulting plaintext, k<sup>-1 </sup>is the inverse key matrix and C is the cipher text</p>
<p>Then, <math><semantics><mrow><msup><mrow><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>3</mn></mtd><mtd><mn>3</mn></mtd></mtr><mtr><mtd><mn>2</mn></mtd><mtd><mn>5</mn></mtd></mtr></mtable></mrow></mfenced></mrow><mrow><mo>-</mo><mn>1</mn></mrow></msup><mo>≡</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>15</mn></mtd><mtd><mn>17</mn></mtd></mtr><mtr><mtd><mn>20</mn></mtd><mtd><mn>9</mn></mtd></mtr></mtable></mrow></mfenced><mo>(</mo><mi>m</mi><mi>o</mi><mi>d</mi><mn>26</mn><mo>)</mo></mrow></semantics></math> and  <math><semantics><mrow><mi>H</mi><mi>I</mi><mi>A</mi><mi>T</mi><mi mathvariant="normal"> </mi><mo>→</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mi>H</mi></mtd></mtr><mtr><mtd><mi>I</mi></mtd></mtr></mtable></mrow></mfenced><mo>,</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mi>A</mi></mtd></mtr><mtr><mtd><mi>T</mi></mtd></mtr></mtable></mrow></mfenced><mo>→</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>7</mn></mtd></mtr><mtr><mtd><mn>8</mn></mtd></mtr></mtable></mrow></mfenced><mo>,</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>0</mn></mtd></mtr><mtr><mtd><mn>19</mn></mtd></mtr></mtable></mrow></mfenced></mrow></semantics></math></p>
<p>Then we compute  <math><semantics><mrow><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>15</mn></mtd><mtd><mn>17</mn></mtd></mtr><mtr><mtd><mn>20</mn></mtd><mtd><mn>9</mn></mtd></mtr></mtable></mrow></mfenced><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>7</mn></mtd></mtr><mtr><mtd><mn>8</mn></mtd></mtr></mtable></mrow></mfenced><mo>≡</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>7</mn></mtd></mtr><mtr><mtd><mn>4</mn></mtd></mtr></mtable></mrow></mfenced><mo>(</mo><mi>m</mi><mi>o</mi><mi>d</mi><mn>26</mn><mo>)</mo></mrow></semantics></math> and <math><semantics><mrow><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>15</mn></mtd><mtd><mn>17</mn></mtd></mtr><mtr><mtd><mn>20</mn></mtd><mtd><mn>9</mn></mtd></mtr></mtable></mrow></mfenced><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>0</mn></mtd></mtr><mtr><mtd><mn>19</mn></mtd></mtr></mtable></mrow></mfenced><mo>≡</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>11</mn></mtd></mtr><mtr><mtd><mn>15</mn></mtd></mtr></mtable></mrow></mfenced><mo>(</mo><mi>m</mi><mi>o</mi><mi>d</mi><mn>26</mn><mo>)</mo></mrow></semantics></math></p>
<p>Therefore, <math><semantics><mrow><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>7</mn></mtd></mtr><mtr><mtd><mn>4</mn></mtd></mtr></mtable></mrow></mfenced><mo>,</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>11</mn></mtd></mtr><mtr><mtd><mn>15</mn></mtd></mtr></mtable></mrow></mfenced><mo>→</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mi>H</mi></mtd></mtr><mtr><mtd><mi>E</mi></mtd></mtr></mtable></mrow></mfenced><mo>,</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mi>L</mi></mtd></mtr><mtr><mtd><mi>P</mi></mtd></mtr></mtable></mrow></mfenced><mo>→</mo><mi>H</mi><mi>E</mi><mi>L</mi><mi>P</mi></mrow></semantics></math>. The receiver of the message can now read the cipher text HIAT as HELP.</p>
<p><bold>Definition 2.10 </bold>Cryptanalysis: Is the study of principles and methods of transforming an unintelligible message back into an intelligible message without knowledge of the key, sometimes using frequency analysis of the alphabets as in theTable <xref ref-type="table" rid="tabtable below"> table below</xref>.</p>
<table-wrap id="tab1">
<label>Table 1</label>
<caption>
<p><b> The </b><b>Prequency</b><b> of English Letters</b></p>
</caption>

<table>
<thead>
<tr>
<th align="center"><bold>Letters </bold></th>
<th align="center"><bold>Frequency (%)</bold></th>
<th align="center"><bold>Letters </bold></th>
<th align="center"><bold>Frequency (%)</bold></th>
<th align="center"></th>
</tr>
</thead>
<tbody>
<tr>
<td align="center">E</td>
<td align="center">11.1607</td>
<td align="center">M</td>
<td align="center">3.0129</td>
<td align="center"></td>
</tr>
<tr>
<td align="center">A</td>
<td align="center">8.4966</td>
<td align="center">H</td>
<td align="center">3.0034</td>
<td align="center"></td>
</tr>
<tr>
<td align="center">R</td>
<td align="center">7.5809</td>
<td align="center">G</td>
<td align="center">2.4705</td>
<td align="center"></td>
</tr>
<tr>
<td align="center">I</td>
<td align="center">7.5448</td>
<td align="center">B</td>
<td align="center">2.0720</td>
<td align="center"></td>
</tr>
<tr>
<td align="center">O</td>
<td align="center">7.1635</td>
<td align="center">F</td>
<td align="center">1.8121</td>
<td align="center"></td>
</tr>
<tr>
<td align="center">T</td>
<td align="center">6.9509</td>
<td align="center">Y</td>
<td align="center">1.7779</td>
<td align="center"></td>
</tr>
<tr>
<td align="center">N</td>
<td align="center">6.6544</td>
<td align="center">W</td>
<td align="center">1.2899</td>
<td align="center"></td>
</tr>
<tr>
<td align="center">S</td>
<td align="center">5.7351</td>
<td align="center">K</td>
<td align="center">1.1016</td>
<td align="center"></td>
</tr>
<tr>
<td align="center">L</td>
<td align="center">5.4893</td>
<td align="center">V</td>
<td align="center">1.0074</td>
<td align="center"></td>
</tr>
<tr>
<td align="center">C</td>
<td align="center">4.5388</td>
<td align="center">X</td>
<td align="center">0.2902</td>
<td align="center"></td>
</tr>
<tr>
<td align="center">U</td>
<td align="center">3.6308</td>
<td align="center">Z</td>
<td align="center">0.2722</td>
<td align="center"></td>
</tr>
<tr>
<td align="center">D</td>
<td align="center">3.3844</td>
<td align="center">J</td>
<td align="center">0.1965</td>
<td align="center"></td>
</tr>
<tr>
<td align="center">P</td>
<td align="center">3.1671</td>
<td align="center">Q</td>
<td align="center">0.1962</td>
<td align="center"></td>
</tr>
</tbody>
</table>
</table-wrap><p><bold>Definition 2.11</bold><bold> </bold>Let &#x26;#x003a9; be a non-empty ordered set such that &#x26;#x003a9; &#x26;#x02282; N. Let Gp = {w<sub>i</sub>: 1&#x26;#x02264;i&#x26;#x02264;p-1} be a subgroup of symmetry group S<sub>n</sub>, such that every &#x26;#x003c9;<sub>i</sub> is generated by arbitrary set &#x26;#x003a9; for any prime p &#x26;#x02265; 5. That means <math><semantics><mrow><msub><mrow><mi>G</mi></mrow><mrow><mi>p</mi></mrow></msub></mrow></semantics></math>  = {w<sub>1</sub>, w<sub>2</sub>, w<sub>3</sub>, --- w<sub>p-1</sub>} be structure such that each w<sub>i</sub><sub> </sub>is generated from the arbitrary set w for any prime<math><semantics><mrow><mi>p</mi><mo>≥</mo><mn>5</mn></mrow></semantics></math>, using the scheme below:</p>

<inline-formula><math><semantics><mrow><msub><mrow><mi>w</mi></mrow><mrow><mi>i</mi></mrow></msub><mi mathvariant="normal"> </mi><mo>=</mo><mi mathvariant="normal"> </mi><mfenced separators="|"><mrow><mfenced separators="|"><mrow><mn>1</mn></mrow></mfenced><mfenced separators="|"><mrow><mn>1</mn><mo>+</mo><mi>i</mi></mrow></mfenced><mi>m</mi><mi>p</mi><mfenced separators="|"><mrow><mn>1</mn><mo>+</mo><mi mathvariant="normal"> </mi><mn>2</mn><mi>i</mi></mrow></mfenced><mi>m</mi><mi>p</mi><mo>…</mo><mo>.</mo><mo>.</mo><mi mathvariant="normal"> </mi><mfenced separators="|"><mrow><mn>1</mn><mi mathvariant="normal"> </mi><mo>+</mo><mi mathvariant="normal"> </mi><mfenced separators="|"><mrow><mi>p</mi><mo>-</mo><mn>1</mn></mrow></mfenced><mi>i</mi></mrow></mfenced><mi>m</mi><mi>p</mi></mrow></mfenced></mrow></semantics></math></inline-formula><p>Then each <math><semantics><mrow><msub><mrow><mi>w</mi></mrow><mrow><mi>i</mi></mrow></msub></mrow></semantics></math> is called a cycle and the elements in each <math><semantics><mrow><msub><mrow><mi>w</mi></mrow><mrow><mi>i</mi></mrow></msub></mrow></semantics></math> are distinct and called successors.</p>
<p>When p = 5, we have:</p>

<inline-formula><math><semantics><mrow><msub><mrow><mi>G</mi></mrow><mrow><mn>5</mn><mi mathvariant="normal"> </mi></mrow></msub><mo>=</mo><mi mathvariant="normal"> </mi><mfenced open="{" close="}" separators="|"><mrow><mi mathvariant="normal">w</mi><mn>1</mn><mo>,</mo><mi mathvariant="normal"> </mi><mi mathvariant="normal">w</mi><mn>2</mn><mo>,</mo><mi mathvariant="normal"> </mi><mi mathvariant="normal">w</mi><mn>3</mn><mo>,</mo><mi mathvariant="normal"> </mi><mi mathvariant="normal">w</mi><mn>4</mn></mrow></mfenced><mo>,</mo><mi mathvariant="normal"> </mi><mi mathvariant="normal"> </mi><msub><mrow><mi>G</mi></mrow><mrow><mn>5</mn></mrow></msub><mo>=</mo><mo>{</mo><mfenced separators="|"><mrow><mn>12345</mn></mrow></mfenced><mo>,</mo><mfenced separators="|"><mrow><mn>13524</mn></mrow></mfenced><mo>,</mo><mfenced separators="|"><mrow><mn>14253</mn></mrow></mfenced><mo>,</mo><mo>(</mo><mn>15432</mn><mo>)</mo><mo>}</mo></mrow></semantics></math></inline-formula><p><bold>Definition 2.12</bold> Transposition cipher (Gp): Transposition cipher is a method of encryption which scrambles the position of characters without changing the characters themselves.</p>
<p><bold>Encryption on </bold><bold>&#x26;#x0d835;&#x26;#x0dc3a;</bold><sub><bold>&#x26;#x0d835;&#x26;#x0dc43;</bold></sub></p>
<p>Since &#x26;#x0d835;&#x26;#x0dc6e;<sub>&#x26;#x0d835;&#x26;#x0dc43; </sub>= (1,<sub>2</sub>, &#x26;#x0d835;&#x26;#x0df14;<sub>3</sub>, &#x26;#x02026;, &#x26;#x0d835;&#x26;#x0df14;<sub>&#x26;#x0d835;&#x26;#x0dc5d;</sub><sub>&#x26;#x02212;1</sub>) then for the encryption process we can define a relation: </p>

<inline-formula><math><semantics><mrow><mi>C</mi><mo>:</mo><mi> </mi><mi>ω</mi><mo>→</mo><mo>(</mo><mn>1</mn><mo>+</mo><mi>i</mi><mo>)</mo></mrow></semantics></math></inline-formula><p>Where <italic>i</italic><italic>&lt; p-1 </italic>Where   &#x26;#x0d835;&#x26;#x0df14;<sub>1</sub>= P, and P is called a plaintext.</p>
<p><bold>Decryption On </bold><bold>&#x26;#x0d835;&#x26;#x0dc3a;</bold><sub><bold>&#x26;#x0d835;&#x26;#x0dc43;</bold></sub></p>
<p>Since &#x26;#x0d835;&#x26;#x0dc6e;<sub><bold> </bold></sub>= (1, &#x26;#x0d835;&#x26;#x0df14;<sub>2</sub>, &#x26;#x0d835;&#x26;#x0df14;<sub>3</sub>, &#x26;#x02026;, &#x26;#x0d835;&#x26;#x0df14;<sub>&#x26;#x0d835;&#x26;#x0dc5d;</sub><sub>&#x26;#x02212;1</sub>) then for the decryption process we have:</p>

<inline-formula><math><semantics><mrow><mi>P</mi><mo>:</mo><mo>(</mo><mn>1</mn><mo>+</mo><mi>i</mi><mo>)</mo><mo>→</mo><msub><mrow><mi>ω</mi></mrow><mrow><mn>1</mn></mrow></msub></mrow></semantics></math></inline-formula><p><bold>Definition 2.13 </bold>Modulo Inverse:  In a modular arithmetic a number &#x26;#x02018;&#x26;#x02019;a&#x26;#x02019;&#x26;#x02019; has a modular inverse a<sup>-1</sup> for a number m, if (a.a<sup>-1</sup>) mod<sub>m</sub> = 1, TheTable <xref ref-type="table" rid="tabtable below"> table below</xref> shows all the possible modular inverses of mod<sub>26</sub>.</p>
<table-wrap id="tab2">
<label>Table 2</label>
<caption>
<p><b>Table 2</b><b>.</b><b> Modulo Inverse of Mod 26</b></p>
</caption>

<table>
<thead>
<tr>
<th align="center">A</th>
<th align="center">1</th>
<th align="center">3</th>
<th align="center">5</th>
<th align="center">7</th>
<th align="center">9</th>
<th align="center">11</th>
<th align="center">15</th>
<th align="center">17</th>
<th align="center">19</th>
<th align="center">21</th>
<th align="center">23</th>
<th align="center">25</th>
<th align="center"></th>
</tr>
</thead>
<tbody>
<tr>
<td align="center">a<sup>-1</sup></td>
<td align="center">1</td>
<td align="center">9</td>
<td align="center">21</td>
<td align="center">15</td>
<td align="center">3</td>
<td align="center">19</td>
<td align="center">7</td>
<td align="center">23</td>
<td align="center">11</td>
<td align="center">5</td>
<td align="center">17</td>
<td align="center">25</td>
<td align="center"></td>
</tr>
</tbody>
</table>
</table-wrap><p></p>
<p>E.g. The modular inverse of 9 is 3 since 9x3 = 27 and 27 mod26 = 1.</p>
<p><bold>Definition 2.14 </bold>Inverse Matrix: The inverse K<sup>-1 </sup>of a matrix K is defined by the equation: KK<sup>-1</sup> =K<sup>-1</sup> K= <italic>I</italic>, where <italic>I </italic>is an &#x26;#x0201c;n x n&#x26;#x0201d; square identity matrix.</p>
<table-wrap id="tab3">
<label>Table 3</label>
<caption>
<p><b> Plaintext Alphabet and Their Corresponding Values</b></p>
</caption>

<table>
<thead>
<tr>
<th align="center">A</th>
<th align="center">B</th>
<th align="center">C</th>
<th align="center">D</th>
<th align="center">E</th>
<th align="center">F</th>
<th align="center">G</th>
<th align="center">H</th>
<th align="center">I</th>
<th align="center">J</th>
<th align="center">K</th>
<th align="center">L</th>
<th align="center">M</th>
<th align="center">N</th>
<th align="center">O</th>
<th align="center">P</th>
<th align="center">Q</th>
<th align="center">R</th>
<th align="center">S</th>
<th align="center">T</th>
<th align="center">U</th>
<th align="center">V</th>
<th align="center">W</th>
<th align="center">X</th>
<th align="center">Y</th>
<th align="center">Z</th>
<th align="center"></th>
</tr>
</thead>
<tbody>
<tr>
<td align="center">0</td>
<td align="center">1</td>
<td align="center">2</td>
<td align="center">3</td>
<td align="center">4</td>
<td align="center">5</td>
<td align="center">6</td>
<td align="center">7</td>
<td align="center">8</td>
<td align="center">9</td>
<td align="center">10</td>
<td align="center">11</td>
<td align="center">12</td>
<td align="center">13</td>
<td align="center">14</td>
<td align="center">15</td>
<td align="center">16</td>
<td align="center">17</td>
<td align="center">18</td>
<td align="center">19</td>
<td align="center">20</td>
<td align="center">21</td>
<td align="center">22</td>
<td align="center">23</td>
<td align="center">24</td>
<td align="center">25</td>
<td align="center"></td>
</tr>
</tbody>
</table>
</table-wrap><p></p>
</sec><sec id="sec3">
<title>Result</title><p>Encryption and decryption processes will take place through two processes. In the encryption process, the plaintext will be encrypted twice with the Hill cipher and Transposition cipher (G<sub>p</sub>) algorithm, different keys will be used for the two encryptions because the two algorithms are different and also in order to make the cipher text more secure from attackers. So different plaintext, different keys.</p>
<p>&#x26;#x0d835;&#x26;#x0dc02;<sub>&#x26;#x0d835;&#x26;#x0dc22; </sub>&#x26;#x02254; Multiple cipher texts.</p>
<p></p>
<p></p>
<p><bold>The encryption process will take the following steps.</bold></p>
<p>Apply encryption function of the Hill cipher on the plaintext (P) to produce cipher text (C<sub>1</sub>).</p>
<p>Apply encryption function of G<sub>p</sub> on C<sub>1</sub> to produce C<sub>2</sub>, where C<sub>2</sub> is the ciphertext sent to the receiver.</p>
<p></p>
<p><bold>The decryption process will use the following steps.</bold></p>
<p>Apply the decryption function of G<sub>p</sub> on C<sub>2</sub> to produce first ciphertext (C<sub>1</sub>).</p>
<p>Apply Hill decryption function on C<sub>1</sub> to produce the original text (plaintext)</p>
<p></p>
<p><bold>Example. </bold>Encrypt the message &#x26;#x0201c;safe messages&#x26;#x0201d; using the key &#x26;#x0201c;ciphering&#x26;#x0201d;</p>
<title>3.1. Encryption Statge</title><p>We encrypt the text using Hill cipher. The key is &#x26;#x0201c;ciphering&#x26;#x0201d;, plaintext should be converted into column vectors of length 3. </p>
<p> matrices, which is equivalent to <math><semantics><mrow><mfenced separators="|"><mrow><mtable><mtr><mtd><mi>s</mi></mtd></mtr><mtr><mtd><mi>a</mi></mtd></mtr><mtr><mtd><mi>f</mi></mtd></mtr></mtable></mrow></mfenced><mfenced separators="|"><mrow><mtable><mtr><mtd><mi>e</mi></mtd></mtr><mtr><mtd><mi>m</mi></mtd></mtr><mtr><mtd><mi>e</mi></mtd></mtr></mtable></mrow></mfenced><mfenced separators="|"><mrow><mtable><mtr><mtd><mi>s</mi></mtd></mtr><mtr><mtd><mi>s</mi></mtd></mtr><mtr><mtd><mi>a</mi></mtd></mtr></mtable></mrow></mfenced><mfenced separators="|"><mrow><mtable><mtr><mtd><mi>g</mi></mtd></mtr><mtr><mtd><mi>e</mi></mtd></mtr><mtr><mtd><mi>s</mi></mtd></mtr></mtable></mrow></mfenced></mrow></semantics></math>, where </p>
<p>, and the key ciphering is <math><semantics><mrow><mfenced separators="|"><mrow><mtable><mtr><mtd><mi>c</mi></mtd><mtd><mi>i</mi></mtd><mtd><mi>p</mi></mtd></mtr><mtr><mtd><mi>h</mi></mtd><mtd><mi>e</mi></mtd><mtd><mi>r</mi></mtd></mtr><mtr><mtd><mi>i</mi></mtd><mtd><mi>n</mi></mtd><mtd><mi>g</mi></mtd></mtr></mtable></mrow></mfenced><mo>=</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>2</mn></mtd><mtd><mn>8</mn></mtd><mtd><mn>15</mn></mtd></mtr><mtr><mtd><mn>7</mn></mtd><mtd><mn>4</mn></mtd><mtd><mn>17</mn></mtd></mtr><mtr><mtd><mn>8</mn></mtd><mtd><mn>13</mn></mtd><mtd><mn>6</mn></mtd></mtr></mtable></mrow></mfenced></mrow></semantics></math>, </p>
<p>The encryption is given by C<sub>1</sub> = K P.</p>

<inline-formula><math><semantics><mrow><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>2</mn></mtd><mtd><mn>8</mn></mtd><mtd><mn>15</mn></mtd></mtr><mtr><mtd><mn>7</mn></mtd><mtd><mn>4</mn></mtd><mtd><mn>17</mn></mtd></mtr><mtr><mtd><mn>8</mn></mtd><mtd><mn>13</mn></mtd><mtd><mn>6</mn></mtd></mtr></mtable></mrow></mfenced><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>18</mn></mtd></mtr><mtr><mtd><mn>0</mn></mtd></mtr><mtr><mtd><mn>5</mn></mtd></mtr></mtable></mrow></mfenced><mi>m</mi><mi>o</mi><mi>d</mi><mn>26</mn><mo>=</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>7</mn></mtd></mtr><mtr><mtd><mn>3</mn></mtd></mtr><mtr><mtd><mn>18</mn></mtd></mtr></mtable></mrow></mfenced><mo>=</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mi>H</mi></mtd></mtr><mtr><mtd><mi>D</mi></mtd></mtr><mtr><mtd><mi>S</mi></mtd></mtr></mtable></mrow></mfenced><mo>,</mo></mrow></semantics></math></inline-formula>
<inline-formula><math><semantics><mrow><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>2</mn></mtd><mtd><mn>8</mn></mtd><mtd><mn>15</mn></mtd></mtr><mtr><mtd><mn>7</mn></mtd><mtd><mn>4</mn></mtd><mtd><mn>17</mn></mtd></mtr><mtr><mtd><mn>8</mn></mtd><mtd><mn>13</mn></mtd><mtd><mn>6</mn></mtd></mtr></mtable></mrow></mfenced><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>14</mn></mtd></mtr><mtr><mtd><mn>12</mn></mtd></mtr><mtr><mtd><mn>4</mn></mtd></mtr></mtable></mrow></mfenced><mi>m</mi><mi>o</mi><mi>d</mi><mn>26</mn><mo>=</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>8</mn></mtd></mtr><mtr><mtd><mn>14</mn></mtd></mtr><mtr><mtd><mn>4</mn></mtd></mtr></mtable></mrow></mfenced><mo>=</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mi>I</mi></mtd></mtr><mtr><mtd><mi>O</mi></mtd></mtr><mtr><mtd><mi>E</mi></mtd></mtr></mtable></mrow></mfenced></mrow></semantics></math></inline-formula>
<inline-formula><math><semantics><mrow><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>2</mn></mtd><mtd><mn>8</mn></mtd><mtd><mn>15</mn></mtd></mtr><mtr><mtd><mn>7</mn></mtd><mtd><mn>4</mn></mtd><mtd><mn>17</mn></mtd></mtr><mtr><mtd><mn>8</mn></mtd><mtd><mn>13</mn></mtd><mtd><mn>6</mn></mtd></mtr></mtable></mrow></mfenced><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>18</mn></mtd></mtr><mtr><mtd><mn>18</mn></mtd></mtr><mtr><mtd><mn>0</mn></mtd></mtr></mtable></mrow></mfenced><mi>m</mi><mi>o</mi><mi>d</mi><mn>26</mn><mo>=</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>24</mn></mtd></mtr><mtr><mtd><mn>16</mn></mtd></mtr><mtr><mtd><mn>14</mn></mtd></mtr></mtable></mrow></mfenced><mo>=</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mi>Y</mi></mtd></mtr><mtr><mtd><mi>Q</mi></mtd></mtr><mtr><mtd><mi>O</mi></mtd></mtr></mtable></mrow></mfenced></mrow></semantics></math></inline-formula>
<inline-formula><math><semantics><mrow><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>2</mn></mtd><mtd><mn>8</mn></mtd><mtd><mn>15</mn></mtd></mtr><mtr><mtd><mn>7</mn></mtd><mtd><mn>4</mn></mtd><mtd><mn>17</mn></mtd></mtr><mtr><mtd><mn>8</mn></mtd><mtd><mn>13</mn></mtd><mtd><mn>6</mn></mtd></mtr></mtable></mrow></mfenced><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>6</mn></mtd></mtr><mtr><mtd><mn>4</mn></mtd></mtr><mtr><mtd><mn>18</mn></mtd></mtr></mtable></mrow></mfenced><mi>m</mi><mi>o</mi><mi>d</mi><mn>26</mn><mo>=</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>2</mn></mtd></mtr><mtr><mtd><mn>0</mn></mtd></mtr><mtr><mtd><mn>0</mn></mtd></mtr></mtable></mrow></mfenced><mo>=</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mi>C</mi></mtd></mtr><mtr><mtd><mi>A</mi></mtd></mtr><mtr><mtd><mi>A</mi></mtd></mtr></mtable></mrow></mfenced></mrow></semantics></math></inline-formula><p>The cipher text is <bold>C</bold><sub><bold>1</bold></sub><bold>=HDSIOEYQOCAA</bold><bold>.</bold></p>
<p>We encrypt the <bold>C</bold><sub><bold>1</bold></sub><bold>=HDSIOEYQOCAA</bold> using Gp where number of letters is 12 but <bold>p</bold> is always prime, then we pad the C<sub>1</sub>with a padding letter X, now <math><semantics><mrow><msubsup><mrow><mi>C</mi></mrow><mrow><mn>1</mn></mrow><mrow><mi>*</mi></mrow></msubsup><mo>=</mo><mi mathvariant="bold">H</mi><mi mathvariant="bold">D</mi><mi mathvariant="bold">S</mi><mi mathvariant="bold">I</mi><mi mathvariant="bold">O</mi><mi mathvariant="bold">E</mi><mi mathvariant="bold">Y</mi><mi mathvariant="bold">Q</mi><mi mathvariant="bold">O</mi><mi mathvariant="bold">C</mi><mi mathvariant="bold">A</mi><mi mathvariant="bold">A</mi><mi mathvariant="bold">X</mi></mrow></semantics></math><bold>.</bold></p>
<p>&#x26;#x0d835;&#x26;#x0dc6e;<sub>13 </sub>=(<sub>1</sub>,&#x26;#x0d835;&#x26;#x0df14;<sub>2</sub>,&#x26;#x0d835;&#x26;#x0df14;<sub>3</sub>,&#x26;#x02026;, &#x26;#x0d835;&#x26;#x0df14;<sub>12</sub>), and w<sub>1</sub>is given below by the table.</p>
<table-wrap id="tab4">
<label>Table 4</label>
<caption>
<p><b> Value of W</b><sub><b>1</b></sub></p>
</caption>

<table>
<thead>
<tr>
<th align="center">1</th>
<th align="center">2</th>
<th align="center">3</th>
<th align="center">4</th>
<th align="center">5</th>
<th align="center">6</th>
<th align="center">7</th>
<th align="center">8</th>
<th align="center">9</th>
<th align="center">10</th>
<th align="center">11</th>
<th align="center">12</th>
<th align="center">13</th>
<th align="center"></th>
</tr>
</thead>
<tbody>
<tr>
<td align="center">H</td>
<td align="center">D</td>
<td align="center">S</td>
<td align="center">I</td>
<td align="center">O</td>
<td align="center">E</td>
<td align="center">Y</td>
<td align="center">Q</td>
<td align="center">O</td>
<td align="center">C</td>
<td align="center">A</td>
<td align="center">A</td>
<td align="center">X</td>
<td align="center"></td>
</tr>
</tbody>
</table>
</table-wrap><p></p>
<p>Let key =1, then we have. <math><semantics><mrow><msub><mrow><mi>w</mi></mrow><mrow><mn>1</mn></mrow></msub><mo>→</mo><msub><mrow><mi>w</mi></mrow><mrow><mo>(</mo><mn>1</mn><mo>+</mo><mi>k</mi><mo>)</mo></mrow></msub></mrow></semantics></math>and k=1, then, we have <math><semantics><mrow><msub><mrow><mi>w</mi></mrow><mrow><mn>1</mn></mrow></msub><mo>→</mo><msub><mrow><mi>w</mi></mrow><mrow><mn>2</mn></mrow></msub></mrow></semantics></math>, and w<sub>2 </sub>is a transposition, given by theTable <xref ref-type="table" rid="tabtable below"> table below</xref> using the scheme of definition 2.1.11 for w<sub>i.</sub></p>
<p></p>
<p></p>
<p></p>
<table-wrap id="tab5">
<label>Table 5</label>
<caption>
<p><b> Value of W</b><sub><b>2</b></sub></p>
</caption>

<table>
<thead>
<tr>
<th align="center">1</th>
<th align="center">3</th>
<th align="center">5</th>
<th align="center">7</th>
<th align="center">9</th>
<th align="center">11</th>
<th align="center">13</th>
<th align="center">2</th>
<th align="center">4</th>
<th align="center">6</th>
<th align="center">8</th>
<th align="center">10</th>
<th align="center">12</th>
<th align="center"></th>
</tr>
</thead>
<tbody>
<tr>
<td align="center">H</td>
<td align="center">S</td>
<td align="center">O</td>
<td align="center">Y</td>
<td align="center">O</td>
<td align="center">A</td>
<td align="center">X</td>
<td align="center">D</td>
<td align="center">I</td>
<td align="center">E</td>
<td align="center">Q</td>
<td align="center">C</td>
<td align="center">A</td>
<td align="center"></td>
</tr>
</tbody>
</table>
</table-wrap><p></p>
<p>Then, <bold>C</bold><sub><bold>2</bold></sub><bold> = HSOYOAXDIEQCA, </bold>the intended receiver and the intruder will receive C<sub>2 </sub>as the message, and then decryption will be performed to get the original message sent.</p>
<title>3.2. Decryption Stage.</title><p>We decrypt the code by using Gp cipher decryption using k=1, as shown method below.</p>

<inline-formula><math><semantics><mrow><msub><mrow><mi>w</mi></mrow><mrow><mfenced separators="|"><mrow><mn>1</mn><mo>+</mo><mi>k</mi></mrow></mfenced></mrow></msub><mo>→</mo><msub><mrow><mi>w</mi></mrow><mrow><mfenced separators="|"><mrow><mfenced separators="|"><mrow><mn>1</mn><mo>+</mo><mi>k</mi></mrow></mfenced><mo>-</mo><mi>k</mi></mrow></mfenced></mrow></msub></mrow></semantics></math></inline-formula>
<inline-formula><math><semantics><mrow><msub><mrow><mi>w</mi></mrow><mrow><mn>2</mn></mrow></msub><mo>→</mo><msub><mrow><mi>w</mi></mrow><mrow><mfenced separators="|"><mrow><mn>2</mn><mo>-</mo><mn>1</mn></mrow></mfenced></mrow></msub></mrow></semantics></math></inline-formula>
<inline-formula><math><semantics><mrow><mo>→</mo><msub><mrow><mi>w</mi></mrow><mrow><mn>1</mn></mrow></msub></mrow></semantics></math></inline-formula><p>And <math><semantics><mrow><msub><mrow><mi>w</mi></mrow><mrow><mn>1</mn></mrow></msub></mrow></semantics></math> is given inTable <xref ref-type="table" rid="tabtable 3">table 3</xref> above, </p>
<p>We decrypt the code <math><semantics><mrow><mo>"</mo><mi mathvariant="bold">H</mi><mi mathvariant="bold">D</mi><mi mathvariant="bold">S</mi><mi mathvariant="bold">I</mi><mi mathvariant="bold">O</mi><mi mathvariant="bold">E</mi><mi mathvariant="bold">Y</mi><mi mathvariant="bold">Q</mi><mi mathvariant="bold">O</mi><mi mathvariant="bold">C</mi><mi mathvariant="bold">A</mi><mi mathvariant="bold">A</mi><mi mathvariant="bold">X</mi><mo>"</mo></mrow></semantics></math>using Hill cipher decryption algorithm :</p>
<p>P = K<sup>-1</sup>C where C = C<sub>1</sub>=  <math><semantics><mrow><mi mathvariant="normal">H</mi><mi mathvariant="normal">D</mi><mi mathvariant="normal">S</mi><mi mathvariant="normal">I</mi><mi mathvariant="normal">O</mi><mi mathvariant="normal">E</mi><mi mathvariant="normal">Y</mi><mi mathvariant="normal">Q</mi><mi mathvariant="normal">O</mi><mi mathvariant="normal">C</mi><mi mathvariant="normal">A</mi><mi mathvariant="normal">A</mi><mi mathvariant="normal">X</mi></mrow></semantics></math>, and k is the key.</p>

<inline-formula><math><semantics><mrow><mi>k</mi><mo>=</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>2</mn></mtd><mtd><mn>8</mn></mtd><mtd><mn>15</mn></mtd></mtr><mtr><mtd><mn>7</mn></mtd><mtd><mn>4</mn></mtd><mtd><mn>17</mn></mtd></mtr><mtr><mtd><mn>8</mn></mtd><mtd><mn>13</mn></mtd><mtd><mn>6</mn></mtd></mtr></mtable></mrow></mfenced><msup><mrow><mi>a</mi><mi>n</mi><mi>d</mi><mi> </mi><mi>K</mi></mrow><mrow><mo>-</mo><mn>1</mn></mrow></msup><mi mathvariant="normal"> </mi><mo>=</mo><msup><mrow><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>2</mn></mtd><mtd><mn>8</mn></mtd><mtd><mn>15</mn></mtd></mtr><mtr><mtd><mn>7</mn></mtd><mtd><mn>4</mn></mtd><mtd><mn>17</mn></mtd></mtr><mtr><mtd><mn>8</mn></mtd><mtd><mn>13</mn></mtd><mtd><mn>6</mn></mtd></mtr></mtable></mrow></mfenced></mrow><mrow><mo>-</mo><mn>1</mn></mrow></msup><mi>m</mi><mi>o</mi><mi>d</mi><mn>26</mn><mo>=</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>3</mn></mtd><mtd><mn>7</mn></mtd><mtd><mn>16</mn></mtd></mtr><mtr><mtd><mn>2</mn></mtd><mtd><mn>6</mn></mtd><mtd><mn>17</mn></mtd></mtr><mtr><mtd><mn>9</mn></mtd><mtd><mn>8</mn></mtd><mtd><mn>20</mn></mtd></mtr></mtable></mrow></mfenced></mrow></semantics></math></inline-formula><p>Therefore, <math><semantics><mrow><mo>"</mo><mi mathvariant="normal">H</mi><mi mathvariant="normal">D</mi><mi mathvariant="normal">S</mi><mi mathvariant="normal">I</mi><mi mathvariant="normal">O</mi><mi mathvariant="normal">E</mi><mi mathvariant="normal">Y</mi><mi mathvariant="normal">Q</mi><mi mathvariant="normal">O</mi><mi mathvariant="normal">C</mi><mi mathvariant="normal">A</mi><mi mathvariant="normal">A</mi><mi mathvariant="normal">X</mi><mo>"</mo></mrow></semantics></math> will be written in n-component vectors as</p>

<inline-formula><math><semantics><mrow><mfenced separators="|"><mrow><mtable><mtr><mtd><mi>H</mi></mtd></mtr><mtr><mtd><mi>D</mi></mtd></mtr><mtr><mtd><mi>S</mi></mtd></mtr></mtable></mrow></mfenced><mo>=</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>7</mn></mtd></mtr><mtr><mtd><mn>3</mn></mtd></mtr><mtr><mtd><mn>18</mn></mtd></mtr></mtable></mrow></mfenced><mo>,</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mi>I</mi></mtd></mtr><mtr><mtd><mi>O</mi></mtd></mtr><mtr><mtd><mi>E</mi></mtd></mtr></mtable></mrow></mfenced><mo>=</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>8</mn></mtd></mtr><mtr><mtd><mn>14</mn></mtd></mtr><mtr><mtd><mn>4</mn></mtd></mtr></mtable></mrow></mfenced><mo>,</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mi>Y</mi></mtd></mtr><mtr><mtd><mi>Q</mi></mtd></mtr><mtr><mtd><mi>O</mi></mtd></mtr></mtable></mrow></mfenced><mo>=</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>24</mn></mtd></mtr><mtr><mtd><mn>16</mn></mtd></mtr><mtr><mtd><mn>14</mn></mtd></mtr></mtable></mrow></mfenced><mo>,</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mi>C</mi></mtd></mtr><mtr><mtd><mi>A</mi></mtd></mtr><mtr><mtd><mi>A</mi></mtd></mtr></mtable></mrow></mfenced><mo>=</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>2</mn></mtd></mtr><mtr><mtd><mn>0</mn></mtd></mtr><mtr><mtd><mn>0</mn></mtd></mtr></mtable></mrow></mfenced></mrow></semantics></math></inline-formula><p>Where X is a padded later to be ignored. Then, </p>

<inline-formula><math><semantics><mrow><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>3</mn></mtd><mtd><mn>7</mn></mtd><mtd><mn>16</mn></mtd></mtr><mtr><mtd><mn>2</mn></mtd><mtd><mn>6</mn></mtd><mtd><mn>17</mn></mtd></mtr><mtr><mtd><mn>9</mn></mtd><mtd><mn>8</mn></mtd><mtd><mn>20</mn></mtd></mtr></mtable></mrow></mfenced><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>7</mn></mtd></mtr><mtr><mtd><mn>3</mn></mtd></mtr><mtr><mtd><mn>18</mn></mtd></mtr></mtable></mrow></mfenced><mi>m</mi><mi>o</mi><mi>d</mi><mn>26</mn><mo>=</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>18</mn></mtd></mtr><mtr><mtd><mn>0</mn></mtd></mtr><mtr><mtd><mn>5</mn></mtd></mtr></mtable></mrow></mfenced><mo>=</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mi>s</mi></mtd></mtr><mtr><mtd><mi>a</mi></mtd></mtr><mtr><mtd><mi>f</mi></mtd></mtr></mtable></mrow></mfenced></mrow></semantics></math></inline-formula>
<inline-formula><math><semantics><mrow><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>3</mn></mtd><mtd><mn>7</mn></mtd><mtd><mn>16</mn></mtd></mtr><mtr><mtd><mn>2</mn></mtd><mtd><mn>6</mn></mtd><mtd><mn>17</mn></mtd></mtr><mtr><mtd><mn>9</mn></mtd><mtd><mn>8</mn></mtd><mtd><mn>20</mn></mtd></mtr></mtable></mrow></mfenced><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>8</mn></mtd></mtr><mtr><mtd><mn>14</mn></mtd></mtr><mtr><mtd><mn>4</mn></mtd></mtr></mtable></mrow></mfenced><mi>m</mi><mi>o</mi><mi>d</mi><mn>26</mn><mo>=</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>4</mn></mtd></mtr><mtr><mtd><mn>12</mn></mtd></mtr><mtr><mtd><mn>4</mn></mtd></mtr></mtable></mrow></mfenced><mo>=</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mi>e</mi></mtd></mtr><mtr><mtd><mi>m</mi></mtd></mtr><mtr><mtd><mi>e</mi></mtd></mtr></mtable></mrow></mfenced></mrow></semantics></math></inline-formula>
<inline-formula><math><semantics><mrow><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>3</mn></mtd><mtd><mn>7</mn></mtd><mtd><mn>16</mn></mtd></mtr><mtr><mtd><mn>2</mn></mtd><mtd><mn>6</mn></mtd><mtd><mn>17</mn></mtd></mtr><mtr><mtd><mn>9</mn></mtd><mtd><mn>8</mn></mtd><mtd><mn>20</mn></mtd></mtr></mtable></mrow></mfenced><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>24</mn></mtd></mtr><mtr><mtd><mn>16</mn></mtd></mtr><mtr><mtd><mn>14</mn></mtd></mtr></mtable></mrow></mfenced><mi>m</mi><mi>o</mi><mi>d</mi><mn>26</mn><mo>=</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>18</mn></mtd></mtr><mtr><mtd><mn>18</mn></mtd></mtr><mtr><mtd><mn>0</mn></mtd></mtr></mtable></mrow></mfenced><mo>=</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mi>s</mi></mtd></mtr><mtr><mtd><mi>s</mi></mtd></mtr><mtr><mtd><mi>a</mi></mtd></mtr></mtable></mrow></mfenced></mrow></semantics></math></inline-formula>
<inline-formula><math><semantics><mrow><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>3</mn></mtd><mtd><mn>7</mn></mtd><mtd><mn>16</mn></mtd></mtr><mtr><mtd><mn>2</mn></mtd><mtd><mn>6</mn></mtd><mtd><mn>17</mn></mtd></mtr><mtr><mtd><mn>9</mn></mtd><mtd><mn>8</mn></mtd><mtd><mn>20</mn></mtd></mtr></mtable></mrow></mfenced><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>2</mn></mtd></mtr><mtr><mtd><mn>0</mn></mtd></mtr><mtr><mtd><mn>0</mn></mtd></mtr></mtable></mrow></mfenced><mi>m</mi><mi>o</mi><mi>d</mi><mn>26</mn><mo>=</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mn>6</mn></mtd></mtr><mtr><mtd><mn>4</mn></mtd></mtr><mtr><mtd><mn>18</mn></mtd></mtr></mtable></mrow></mfenced><mo>=</mo><mfenced separators="|"><mrow><mtable><mtr><mtd><mi>g</mi></mtd></mtr><mtr><mtd><mi>e</mi></mtd></mtr><mtr><mtd><mi>s</mi></mtd></mtr></mtable></mrow></mfenced></mrow></semantics></math></inline-formula><p>P = safemessages, after paraphrasing we have &#x26;#x0201c;safe messages&#x26;#x0201d;, the process of decryption is now complete.</p>
</sec><sec id="sec4">
<title>Discussion and Conclusion</title><p>The idea of using transposition on Gp was first proposed by [
<xref ref-type="bibr" rid="R1">1</xref>] and [
<xref ref-type="bibr" rid="R7">7</xref>] considering security features of transposition cipher which include being more simple to decipher for the intended recipient and very difficult for the unintended recipient of the message and therefore it provides higher level of security to the data being sent over communication channels, and also the Hill cipher is a digraph in nature but can expand to multiply any size of letters, adding more complexity and reliability for better security of the information sent. And finally, the authors discovered that, combination of Hill and transposition gives a cipher text that is somehow impossible for the attackers to get the original message due to multiple algorithms applied there by providing a more complicated cipher text for the intruders.</p>
<p>Hill cipher and transposition cipher (Gp) were been studied individually and their combination give more secure ciphertext than in their ordinary form and cryptanalysis fails due to multiple algorithms employed in the study.</p>
<p></p>
<p><bold>Acknowledgement</bold></p>
<p>We would like to express our gratitude to all of the staff of UDUSOK and FUBK Mathematics Department for their immense support in the development of this manuscript for their guidance and contribution in finishing this manuscript.</p>
<p><bold>Author Contributions</bold></p>
<p>Conception and design: Hassan, A., and Sani, S. Drafting of the manuscript: Hassan, A and Sani, S. Revision of the manuscript: Abdullahi, U and Sahalu, S. S. Critical Revision of the manuscript: all authors. All authors read and approved the final version of the manuscript.</p>
</sec>
  </body>
  <back>
    <ref-list>
      <title>References</title>
      
<ref id="R1">
<label>[1]</label>
<mixed-citation publication-type="other">Alhassan, M. J; Hassan, A; Sani, S. and Alhassan, Y.(2021).A Combined Technique of an Affine Cipher and Transposition Cipher Quest Journals Journal of Research in Applied Mathematics Volume 7. Issue 10 (2021) pp: 08-12
</mixed-citation>
</ref>
<ref id="R2">
<label>[2]</label>
<mixed-citation publication-type="other">Audu M.S. (1986), Generating Sets for Transitive Permutation groups of prime-power order. The Journal of Mathematical Association of Nigeria Abacus, 17(2), 22-26.
</mixed-citation>
</ref>
<ref id="R3">
<label>[3]</label>
<mixed-citation publication-type="other">Azzam A and Sumarsono (2017), A Modifying of Hill Cipher Algorithm with 3 Substitution Ceaser Cipher. Proceedings International Conference of Science and Engineering, Indonesia.1: 157-163.
</mixed-citation>
</ref>
<ref id="R4">
<label>[4]</label>
<mixed-citation publication-type="other">Fahrul I, K., Hassan F, S., Toras P and Rahmat W. (2017), Combination of Ceaser Cipher Modification with Transposition Cipher. Advances in Science Technology and Engineering Systems Journal. 2(5): 22-25.
</mixed-citation>
</ref>
<ref id="R5">
<label>[5]</label>
<mixed-citation publication-type="other">Garba A. I, Yusuf A and Hassan A. (2018), Some Topological Properties of a Constructed Algebraic Structure. Journal of the Nigerian Association of Mathematical Physics, 45:21-26
</mixed-citation>
</ref>
<ref id="R6">
<label>[6]</label>
<mixed-citation publication-type="other">Garba A. I, Zakari, Y. and Hassan, A. (2019), on the fuzzy nature of constructed algebraic structure G_p. Bayero Journal of Pure and applied sciences, 12(1):146-150
</mixed-citation>
</ref>
<ref id="R7">
<label>[7]</label>
<mixed-citation publication-type="other">Hassan, A; Alhassan, M. J; Alhassan, Y. and Sani, S. (2021). Cryptography as a Solution for a Better Security International Journal of Advances in Engineering and Management (IJAEM :3(12). pp: 849-853
</mixed-citation>
</ref>
<ref id="R8">
<label>[8]</label>
<mixed-citation publication-type="other">https://www3.nd.edu/~busiforc/handouts/cryptography/letterfrequencies.html
</mixed-citation>
</ref>
<ref id="R9">
<label>[9]</label>
<mixed-citation publication-type="other">Ibrahim A. A. (2006), Correspondence between the Length of some Class of Permutation patterns and Primitive Elements of Automophism Group modulo n, Abacus. The Journal of mathematical Association of Nigeria, 33:143-154.
</mixed-citation>
</ref>
<ref id="R10">
<label>[10]</label>
<mixed-citation publication-type="other">Kuriakkottu A. R. (2021). Use of Transposition Cipher and its Types. International Journal of Research and Engineering, Science and Management 4(11), 164-165
</mixed-citation>
</ref>
<ref id="R11">
<label>[11]</label>
<mixed-citation publication-type="other">Kashish G and Supriya K.(2013) Modified Ceaser Cipher for a Better Security Enhancement. International Journal of Computer Application.73:26-31
</mixed-citation>
</ref>
<ref id="R12">
<label>[12]</label>
<mixed-citation publication-type="other">Mishra A. (2013), Enhancing security of Ceaser cipher using different methods. International Journal of Research in Engineering and Technology 2(09):327-332.
</mixed-citation>
</ref>
<ref id="R13">
<label>[13]</label>
<mixed-citation publication-type="other">Massoud S., Sokouti B. and Saeid P. (2009), An Approach in Improving Transposition cipher System. Indian Journal of Science and Technology.2(8):9-15.
</mixed-citation>
</ref>
<ref id="R14">
<label>[14]</label>
<mixed-citation publication-type="other">Pooja S and Pintu S. (2017), Enhancing security of Ceaser cipher using "Divide and Conquer Approach". International Journal of Advance Research in Science and Engineering. 06(02):144-150.
</mixed-citation>
</ref>
<ref id="R15">
<label>[15]</label>
<mixed-citation publication-type="other">Rajput Y., Naik D. and Mane C. (2014), An improved cryptographic technique to encrypt Text message using double encryption. International Journal of Computer Applications86(6):24-28.
</mixed-citation>
</ref>
<ref id="R16">
<label>[16]</label>
<mixed-citation publication-type="other">Sriramoju Ajay Babu. (2017), modification affine ciphers algorithm for cryptography password, Programmer Analyst , Randstad Technologies, EQT Plaza 625 Liberty Avenue, Suite 1020 ,Pittsburgh, Pennsylvania -15222, USA.
</mixed-citation>
</ref>
<ref id="R17">
<label>[17]</label>
<mixed-citation publication-type="other">Shahid B. D. (2014), enhancing the security of Ceaser cipher using double substitution method. International Journal of Computer Science and Engineering Technology.5:772-774.
</mixed-citation>
</ref>
<ref id="R18">
<label>[18]</label>
<mixed-citation publication-type="other">M. S. Magami and A. A. Ibrahim (2011). Construction of Association Scheme using some (123) - avoiding class of Aunu patterns. Nigerian Journals of Basic &#x00026; Applied Sciences (NJBAS). 19(1), 5-8. ISSN 0794-5698. (Index)
</mixed-citation>
</ref>
<ref id="R19">
<label>[19]</label>
<mixed-citation publication-type="other">Usman. A. and Magami M. S. (2015). An Analysis of Group Theoretic Properties of A Class of (123)- avoiding Pattern of Aunu Numbers Using Thin Cyclic Design. Mathematical Theory and Modeling,. 5(5) 45-48 .ISSN (Paper) 2224-5804 ISSN (Online) 2225-0522DOI: 10.7176/MTM
</mixed-citation>
</ref>
<ref id="R20">
<label>[20]</label>
<mixed-citation publication-type="other">M. S. Magami, O. U. Amama, A. I. Garba, (2022). Construction of Vector Space Using Permutation Patterns. Journal of the Mathematical Association of Nigeria. Abacus (Mathematics Science Series) 49(2) 147-153.
</mixed-citation>
</ref>
<ref id="R21">
<label>[21]</label>
<mixed-citation publication-type="other">S. M. Magami and S. U. Ashafa. (2023). Some parameters of commuting graph of a Multigroups. Far East Journal of Applied Mathematics Pushpa Publishing House, Prayagraj, India http://www.pphmj.comhttp://dx.doi.org/10.17654/0972096023005116 (1), 61-71 P-ISSN: 0972-0960
</mixed-citation>
</ref>
<ref id="R22">
<label>[22]</label>
<mixed-citation publication-type="other">Magami M. S. and Ibrahim M. (2021). Partition block coordinate statistics on non-deranged permutation. Journal of Research in Applied Mathematics, 7(9) 28-33. ISSN (Online):2394-0743: ISSN(Print): 2394-0735 (Index)
</mixed-citation>
</ref>
<ref id="R23">
<label>[23]</label>
<mixed-citation publication-type="other">Magami M. S. and Ibrahim M. (2021). "Admissible Inversion on non-deranged permutations" Asian Research Journal of Mathematics. ISSN: 2456-477X DOI:10.9734/ARJOM/2021/v17i830322
</mixed-citation>
</ref>
<ref id="R1">
<label>[1]</label>
<mixed-citation publication-type="other">Alhassan, M. J; Hassan, A; Sani, S. and Alhassan, Y.(2021).A Combined Technique of an Affine Cipher and Transposition Cipher Quest Journals Journal of Research in Applied Mathematics Volume 7. Issue 10 (2021) pp: 08-12
</mixed-citation>
</ref>
<ref id="R2">
<label>[2]</label>
<mixed-citation publication-type="other">Audu M.S. (1986), Generating Sets for Transitive Permutation groups of prime-power order. The Journal of Mathematical Association of Nigeria Abacus, 17(2), 22-26.
</mixed-citation>
</ref>
<ref id="R3">
<label>[3]</label>
<mixed-citation publication-type="other">Azzam A and Sumarsono (2017), A Modifying of Hill Cipher Algorithm with 3 Substitution Ceaser Cipher. Proceedings International Conference of Science and Engineering, Indonesia.1: 157-163.
</mixed-citation>
</ref>
<ref id="R4">
<label>[4]</label>
<mixed-citation publication-type="other">Fahrul I, K., Hassan F, S., Toras P and Rahmat W. (2017), Combination of Ceaser Cipher Modification with Transposition Cipher. Advances in Science Technology and Engineering Systems Journal. 2(5): 22-25.
</mixed-citation>
</ref>
<ref id="R5">
<label>[5]</label>
<mixed-citation publication-type="other">Garba A. I, Yusuf A and Hassan A. (2018), Some Topological Properties of a Constructed Algebraic Structure. Journal of the Nigerian Association of Mathematical Physics, 45:21-26
</mixed-citation>
</ref>
<ref id="R6">
<label>[6]</label>
<mixed-citation publication-type="other">Garba A. I, Zakari, Y. and Hassan, A. (2019), on the fuzzy nature of constructed algebraic structure G_p. Bayero Journal of Pure and applied sciences, 12(1):146-150
</mixed-citation>
</ref>
<ref id="R7">
<label>[7]</label>
<mixed-citation publication-type="other">Hassan, A; Alhassan, M. J; Alhassan, Y. and Sani, S. (2021). Cryptography as a Solution for a Better Security International Journal of Advances in Engineering and Management (IJAEM :3(12). pp: 849-853
</mixed-citation>
</ref>
<ref id="R8">
<label>[8]</label>
<mixed-citation publication-type="other">https://www3.nd.edu/~busiforc/handouts/cryptography/letterfrequencies.html
</mixed-citation>
</ref>
<ref id="R9">
<label>[9]</label>
<mixed-citation publication-type="other">Ibrahim A. A. (2006), Correspondence between the Length of some Class of Permutation patterns and Primitive Elements of Automophism Group modulo n, Abacus. The Journal of mathematical Association of Nigeria, 33:143-154.
</mixed-citation>
</ref>
<ref id="R10">
<label>[10]</label>
<mixed-citation publication-type="other">Kuriakkottu A. R. (2021). Use of Transposition Cipher and its Types. International Journal of Research and Engineering, Science and Management 4(11), 164-165
</mixed-citation>
</ref>
<ref id="R11">
<label>[11]</label>
<mixed-citation publication-type="other">Kashish G and Supriya K.(2013) Modified Ceaser Cipher for a Better Security Enhancement. International Journal of Computer Application.73:26-31
</mixed-citation>
</ref>
<ref id="R12">
<label>[12]</label>
<mixed-citation publication-type="other">Mishra A. (2013), Enhancing security of Ceaser cipher using different methods. International Journal of Research in Engineering and Technology 2(09):327-332.
</mixed-citation>
</ref>
<ref id="R13">
<label>[13]</label>
<mixed-citation publication-type="other">Massoud S., Sokouti B. and Saeid P. (2009), An Approach in Improving Transposition cipher System. Indian Journal of Science and Technology.2(8):9-15.
</mixed-citation>
</ref>
<ref id="R14">
<label>[14]</label>
<mixed-citation publication-type="other">Pooja S and Pintu S. (2017), Enhancing security of Ceaser cipher using "Divide and Conquer Approach". International Journal of Advance Research in Science and Engineering. 06(02):144-150.
</mixed-citation>
</ref>
<ref id="R15">
<label>[15]</label>
<mixed-citation publication-type="other">Rajput Y., Naik D. and Mane C. (2014), An improved cryptographic technique to encrypt Text message using double encryption. International Journal of Computer Applications86(6):24-28.
</mixed-citation>
</ref>
<ref id="R16">
<label>[16]</label>
<mixed-citation publication-type="other">Sriramoju Ajay Babu. (2017), modification affine ciphers algorithm for cryptography password, Programmer Analyst , Randstad Technologies, EQT Plaza 625 Liberty Avenue, Suite 1020 ,Pittsburgh, Pennsylvania -15222, USA.
</mixed-citation>
</ref>
<ref id="R17">
<label>[17]</label>
<mixed-citation publication-type="other">Shahid B. D. (2014), enhancing the security of Ceaser cipher using double substitution method. International Journal of Computer Science and Engineering Technology.5:772-774.
</mixed-citation>
</ref>
<ref id="R18">
<label>[18]</label>
<mixed-citation publication-type="other">M. S. Magami and A. A. Ibrahim (2011). Construction of Association Scheme using some (123) - avoiding class of Aunu patterns. Nigerian Journals of Basic &#x00026; Applied Sciences (NJBAS). 19(1), 5-8. ISSN 0794-5698. (Index)
</mixed-citation>
</ref>
<ref id="R19">
<label>[19]</label>
<mixed-citation publication-type="other">Usman. A. and Magami M. S. (2015). An Analysis of Group Theoretic Properties of A Class of (123)- avoiding Pattern of Aunu Numbers Using Thin Cyclic Design. Mathematical Theory and Modeling,. 5(5) 45-48 .ISSN (Paper) 2224-5804 ISSN (Online) 2225-0522DOI: 10.7176/MTM
</mixed-citation>
</ref>
<ref id="R20">
<label>[20]</label>
<mixed-citation publication-type="other">M. S. Magami, O. U. Amama, A. I. Garba, (2022). Construction of Vector Space Using Permutation Patterns. Journal of the Mathematical Association of Nigeria. Abacus (Mathematics Science Series) 49(2) 147-153.
</mixed-citation>
</ref>
<ref id="R21">
<label>[21]</label>
<mixed-citation publication-type="other">S. M. Magami and S. U. Ashafa. (2023). Some parameters of commuting graph of a Multigroups. Far East Journal of Applied Mathematics Pushpa Publishing House, Prayagraj, India http://www.pphmj.comhttp://dx.doi.org/10.17654/0972096023005116 (1), 61-71 P-ISSN: 0972-0960
</mixed-citation>
</ref>
<ref id="R22">
<label>[22]</label>
<mixed-citation publication-type="other">Magami M. S. and Ibrahim M. (2021). Partition block coordinate statistics on non-deranged permutation. Journal of Research in Applied Mathematics, 7(9) 28-33. ISSN (Online):2394-0743: ISSN(Print): 2394-0735 (Index)
</mixed-citation>
</ref>
<ref id="R23">
<label>[23]</label>
<mixed-citation publication-type="other">Magami M. S. and Ibrahim M. (2021). "Admissible Inversion on non-deranged permutations" Asian Research Journal of Mathematics. ISSN: 2456-477X DOI:10.9734/ARJOM/2021/v17i830322
</mixed-citation>
</ref>
<ref id="R1">
<label>[1]</label>
<mixed-citation publication-type="other">Alhassan, M. J; Hassan, A; Sani, S. and Alhassan, Y.(2021).A Combined Technique of an Affine Cipher and Transposition Cipher Quest Journals Journal of Research in Applied Mathematics Volume 7. Issue 10 (2021) pp: 08-12
</mixed-citation>
</ref>
<ref id="R2">
<label>[2]</label>
<mixed-citation publication-type="other">Audu M.S. (1986), Generating Sets for Transitive Permutation groups of prime-power order. The Journal of Mathematical Association of Nigeria Abacus, 17(2), 22-26.
</mixed-citation>
</ref>
<ref id="R3">
<label>[3]</label>
<mixed-citation publication-type="other">Azzam A and Sumarsono (2017), A Modifying of Hill Cipher Algorithm with 3 Substitution Ceaser Cipher. Proceedings International Conference of Science and Engineering, Indonesia.1: 157-163.
</mixed-citation>
</ref>
<ref id="R4">
<label>[4]</label>
<mixed-citation publication-type="other">Fahrul I, K., Hassan F, S., Toras P and Rahmat W. (2017), Combination of Ceaser Cipher Modification with Transposition Cipher. Advances in Science Technology and Engineering Systems Journal. 2(5): 22-25.
</mixed-citation>
</ref>
<ref id="R5">
<label>[5]</label>
<mixed-citation publication-type="other">Garba A. I, Yusuf A and Hassan A. (2018), Some Topological Properties of a Constructed Algebraic Structure. Journal of the Nigerian Association of Mathematical Physics, 45:21-26
</mixed-citation>
</ref>
<ref id="R6">
<label>[6]</label>
<mixed-citation publication-type="other">Garba A. I, Zakari, Y. and Hassan, A. (2019), on the fuzzy nature of constructed algebraic structure G_p. Bayero Journal of Pure and applied sciences, 12(1):146-150
</mixed-citation>
</ref>
<ref id="R7">
<label>[7]</label>
<mixed-citation publication-type="other">Hassan, A; Alhassan, M. J; Alhassan, Y. and Sani, S. (2021). Cryptography as a Solution for a Better Security International Journal of Advances in Engineering and Management (IJAEM :3(12). pp: 849-853
</mixed-citation>
</ref>
<ref id="R8">
<label>[8]</label>
<mixed-citation publication-type="other">https://www3.nd.edu/~busiforc/handouts/cryptography/letterfrequencies.html
</mixed-citation>
</ref>
<ref id="R9">
<label>[9]</label>
<mixed-citation publication-type="other">Ibrahim A. A. (2006), Correspondence between the Length of some Class of Permutation patterns and Primitive Elements of Automophism Group modulo n, Abacus. The Journal of mathematical Association of Nigeria, 33:143-154.
</mixed-citation>
</ref>
<ref id="R10">
<label>[10]</label>
<mixed-citation publication-type="other">Kuriakkottu A. R. (2021). Use of Transposition Cipher and its Types. International Journal of Research and Engineering, Science and Management 4(11), 164-165
</mixed-citation>
</ref>
<ref id="R11">
<label>[11]</label>
<mixed-citation publication-type="other">Kashish G and Supriya K.(2013) Modified Ceaser Cipher for a Better Security Enhancement. International Journal of Computer Application.73:26-31
</mixed-citation>
</ref>
<ref id="R12">
<label>[12]</label>
<mixed-citation publication-type="other">Mishra A. (2013), Enhancing security of Ceaser cipher using different methods. International Journal of Research in Engineering and Technology 2(09):327-332.
</mixed-citation>
</ref>
<ref id="R13">
<label>[13]</label>
<mixed-citation publication-type="other">Massoud S., Sokouti B. and Saeid P. (2009), An Approach in Improving Transposition cipher System. Indian Journal of Science and Technology.2(8):9-15.
</mixed-citation>
</ref>
<ref id="R14">
<label>[14]</label>
<mixed-citation publication-type="other">Pooja S and Pintu S. (2017), Enhancing security of Ceaser cipher using "Divide and Conquer Approach". International Journal of Advance Research in Science and Engineering. 06(02):144-150.
</mixed-citation>
</ref>
<ref id="R15">
<label>[15]</label>
<mixed-citation publication-type="other">Rajput Y., Naik D. and Mane C. (2014), An improved cryptographic technique to encrypt Text message using double encryption. International Journal of Computer Applications86(6):24-28.
</mixed-citation>
</ref>
<ref id="R16">
<label>[16]</label>
<mixed-citation publication-type="other">Sriramoju Ajay Babu. (2017), modification affine ciphers algorithm for cryptography password, Programmer Analyst , Randstad Technologies, EQT Plaza 625 Liberty Avenue, Suite 1020 ,Pittsburgh, Pennsylvania -15222, USA.
</mixed-citation>
</ref>
<ref id="R17">
<label>[17]</label>
<mixed-citation publication-type="other">Shahid B. D. (2014), enhancing the security of Ceaser cipher using double substitution method. International Journal of Computer Science and Engineering Technology.5:772-774.
</mixed-citation>
</ref>
<ref id="R18">
<label>[18]</label>
<mixed-citation publication-type="other">M. S. Magami and A. A. Ibrahim (2011). Construction of Association Scheme using some (123) - avoiding class of Aunu patterns. Nigerian Journals of Basic &#x00026; Applied Sciences (NJBAS). 19(1), 5-8. ISSN 0794-5698. (Index)
</mixed-citation>
</ref>
<ref id="R19">
<label>[19]</label>
<mixed-citation publication-type="other">Usman. A. and Magami M. S. (2015). An Analysis of Group Theoretic Properties of A Class of (123)- avoiding Pattern of Aunu Numbers Using Thin Cyclic Design. Mathematical Theory and Modeling,. 5(5) 45-48 .ISSN (Paper) 2224-5804 ISSN (Online) 2225-0522DOI: 10.7176/MTM
</mixed-citation>
</ref>
<ref id="R20">
<label>[20]</label>
<mixed-citation publication-type="other">M. S. Magami, O. U. Amama, A. I. Garba, (2022). Construction of Vector Space Using Permutation Patterns. Journal of the Mathematical Association of Nigeria. Abacus (Mathematics Science Series) 49(2) 147-153.
</mixed-citation>
</ref>
<ref id="R21">
<label>[21]</label>
<mixed-citation publication-type="other">S. M. Magami and S. U. Ashafa. (2023). Some parameters of commuting graph of a Multigroups. Far East Journal of Applied Mathematics Pushpa Publishing House, Prayagraj, India http://www.pphmj.comhttp://dx.doi.org/10.17654/0972096023005116 (1), 61-71 P-ISSN: 0972-0960
</mixed-citation>
</ref>
<ref id="R22">
<label>[22]</label>
<mixed-citation publication-type="other">Magami M. S. and Ibrahim M. (2021). Partition block coordinate statistics on non-deranged permutation. Journal of Research in Applied Mathematics, 7(9) 28-33. ISSN (Online):2394-0743: ISSN(Print): 2394-0735 (Index)
</mixed-citation>
</ref>
<ref id="R23">
<label>[23]</label>
<mixed-citation publication-type="other">Magami M. S. and Ibrahim M. (2021). "Admissible Inversion on non-deranged permutations" Asian Research Journal of Mathematics. ISSN: 2456-477X DOI:10.9734/ARJOM/2021/v17i830322
</mixed-citation>
</ref>
<ref id="R1">
<label>[1]</label>
<mixed-citation publication-type="other">Alhassan, M. J; Hassan, A; Sani, S. and Alhassan, Y.(2021).A Combined Technique of an Affine Cipher and Transposition Cipher Quest Journals Journal of Research in Applied Mathematics Volume 7. Issue 10 (2021) pp: 08-12
</mixed-citation>
</ref>
<ref id="R2">
<label>[2]</label>
<mixed-citation publication-type="other">Audu M.S. (1986), Generating Sets for Transitive Permutation groups of prime-power order. The Journal of Mathematical Association of Nigeria Abacus, 17(2), 22-26.
</mixed-citation>
</ref>
<ref id="R3">
<label>[3]</label>
<mixed-citation publication-type="other">Azzam A and Sumarsono (2017), A Modifying of Hill Cipher Algorithm with 3 Substitution Ceaser Cipher. Proceedings International Conference of Science and Engineering, Indonesia.1: 157-163.
</mixed-citation>
</ref>
<ref id="R4">
<label>[4]</label>
<mixed-citation publication-type="other">Fahrul I, K., Hassan F, S., Toras P and Rahmat W. (2017), Combination of Ceaser Cipher Modification with Transposition Cipher. Advances in Science Technology and Engineering Systems Journal. 2(5): 22-25.
</mixed-citation>
</ref>
<ref id="R5">
<label>[5]</label>
<mixed-citation publication-type="other">Garba A. I, Yusuf A and Hassan A. (2018), Some Topological Properties of a Constructed Algebraic Structure. Journal of the Nigerian Association of Mathematical Physics, 45:21-26
</mixed-citation>
</ref>
<ref id="R6">
<label>[6]</label>
<mixed-citation publication-type="other">Garba A. I, Zakari, Y. and Hassan, A. (2019), on the fuzzy nature of constructed algebraic structure G_p. Bayero Journal of Pure and applied sciences, 12(1):146-150
</mixed-citation>
</ref>
<ref id="R7">
<label>[7]</label>
<mixed-citation publication-type="other">Hassan, A; Alhassan, M. J; Alhassan, Y. and Sani, S. (2021). Cryptography as a Solution for a Better Security International Journal of Advances in Engineering and Management (IJAEM :3(12). pp: 849-853
</mixed-citation>
</ref>
<ref id="R8">
<label>[8]</label>
<mixed-citation publication-type="other">https://www3.nd.edu/~busiforc/handouts/cryptography/letterfrequencies.html
</mixed-citation>
</ref>
<ref id="R9">
<label>[9]</label>
<mixed-citation publication-type="other">Ibrahim A. A. (2006), Correspondence between the Length of some Class of Permutation patterns and Primitive Elements of Automophism Group modulo n, Abacus. The Journal of mathematical Association of Nigeria, 33:143-154.
</mixed-citation>
</ref>
<ref id="R10">
<label>[10]</label>
<mixed-citation publication-type="other">Kuriakkottu A. R. (2021). Use of Transposition Cipher and its Types. International Journal of Research and Engineering, Science and Management 4(11), 164-165
</mixed-citation>
</ref>
<ref id="R11">
<label>[11]</label>
<mixed-citation publication-type="other">Kashish G and Supriya K.(2013) Modified Ceaser Cipher for a Better Security Enhancement. International Journal of Computer Application.73:26-31
</mixed-citation>
</ref>
<ref id="R12">
<label>[12]</label>
<mixed-citation publication-type="other">Mishra A. (2013), Enhancing security of Ceaser cipher using different methods. International Journal of Research in Engineering and Technology 2(09):327-332.
</mixed-citation>
</ref>
<ref id="R13">
<label>[13]</label>
<mixed-citation publication-type="other">Massoud S., Sokouti B. and Saeid P. (2009), An Approach in Improving Transposition cipher System. Indian Journal of Science and Technology.2(8):9-15.
</mixed-citation>
</ref>
<ref id="R14">
<label>[14]</label>
<mixed-citation publication-type="other">Pooja S and Pintu S. (2017), Enhancing security of Ceaser cipher using "Divide and Conquer Approach". International Journal of Advance Research in Science and Engineering. 06(02):144-150.
</mixed-citation>
</ref>
<ref id="R15">
<label>[15]</label>
<mixed-citation publication-type="other">Rajput Y., Naik D. and Mane C. (2014), An improved cryptographic technique to encrypt Text message using double encryption. International Journal of Computer Applications86(6):24-28.
</mixed-citation>
</ref>
<ref id="R16">
<label>[16]</label>
<mixed-citation publication-type="other">Sriramoju Ajay Babu. (2017), modification affine ciphers algorithm for cryptography password, Programmer Analyst , Randstad Technologies, EQT Plaza 625 Liberty Avenue, Suite 1020 ,Pittsburgh, Pennsylvania -15222, USA.
</mixed-citation>
</ref>
<ref id="R17">
<label>[17]</label>
<mixed-citation publication-type="other">Shahid B. D. (2014), enhancing the security of Ceaser cipher using double substitution method. International Journal of Computer Science and Engineering Technology.5:772-774.
</mixed-citation>
</ref>
<ref id="R18">
<label>[18]</label>
<mixed-citation publication-type="other">M. S. Magami and A. A. Ibrahim (2011). Construction of Association Scheme using some (123) - avoiding class of Aunu patterns. Nigerian Journals of Basic &#x00026; Applied Sciences (NJBAS). 19(1), 5-8. ISSN 0794-5698. (Index)
</mixed-citation>
</ref>
<ref id="R19">
<label>[19]</label>
<mixed-citation publication-type="other">Usman. A. and Magami M. S. (2015). An Analysis of Group Theoretic Properties of A Class of (123)- avoiding Pattern of Aunu Numbers Using Thin Cyclic Design. Mathematical Theory and Modeling,. 5(5) 45-48 .ISSN (Paper) 2224-5804 ISSN (Online) 2225-0522DOI: 10.7176/MTM
</mixed-citation>
</ref>
<ref id="R20">
<label>[20]</label>
<mixed-citation publication-type="other">M. S. Magami, O. U. Amama, A. I. Garba, (2022). Construction of Vector Space Using Permutation Patterns. Journal of the Mathematical Association of Nigeria. Abacus (Mathematics Science Series) 49(2) 147-153.
</mixed-citation>
</ref>
<ref id="R21">
<label>[21]</label>
<mixed-citation publication-type="other">S. M. Magami and S. U. Ashafa. (2023). Some parameters of commuting graph of a Multigroups. Far East Journal of Applied Mathematics Pushpa Publishing House, Prayagraj, India http://www.pphmj.comhttp://dx.doi.org/10.17654/0972096023005116 (1), 61-71 P-ISSN: 0972-0960
</mixed-citation>
</ref>
<ref id="R22">
<label>[22]</label>
<mixed-citation publication-type="other">Magami M. S. and Ibrahim M. (2021). Partition block coordinate statistics on non-deranged permutation. Journal of Research in Applied Mathematics, 7(9) 28-33. ISSN (Online):2394-0743: ISSN(Print): 2394-0735 (Index)
</mixed-citation>
</ref>
<ref id="R23">
<label>[23]</label>
<mixed-citation publication-type="other">Magami M. S. and Ibrahim M. (2021). "Admissible Inversion on non-deranged permutations" Asian Research Journal of Mathematics. ISSN: 2456-477X DOI:10.9734/ARJOM/2021/v17i830322
</mixed-citation>
</ref>
    </ref-list>
  </back>
</article>