Research Output | Dar Al-hikmah Library | IIUM Only
Previously traditional methods were sufficient to protect the information, since it is simplicity in the past does not need complicated methods but with the progress of information technology,it become easy to attack systems, and detection of encryption methods became necessary to find ways parallel with the differing methods used by hackers, so th