Mohammed , marwa S., and A. N. Hashim. “ and Its Most Extensively Used Encryption Techniques”. Al-Salam Journal for Engineering and Technology, vol. 2, no. 2, May 2023, pp. 140-51, doi:10.55145/ajest.2023.02.02.017.