Mohammed , marwa S. and Hashim, A. N. (2023) “ and its most extensively used encryption techniques”., Al-Salam Journal for Engineering and Technology, 2(2), pp. 140–151. doi: 10.55145/ajest.2023.02.02.017.