@incollection{, 26E64D4B72B9D6752FED0792A3567A77 , author={{Dr. Sharaf A.Alhomdy} and {Dr. Saleh N.Abdullah} and {Faculty of Computer and Information Technology, Sanaa University}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}1512629 } @book{b0, , title={{Cryptography: Theory and Practice}} , author={{ Douglasr } and { Stinson }} , year={2002} , publisher={Chapman & Hall/CRC} , address={Waterloo, Ontario Canada} University of Waterloo , note={2nd Ed} } @incollection{b1, , title={{Applied Cryptography" 3rdEd}} , author={{ BruceSchneier }} , journal={{ASIA) Pvt. Ltd. Singapore}} 129809 , year={2010} , publisher={John Wiley & Sons} } @book{b2, , title={{Computer Security Basics" O'}} , author={{ DRussell } and { GTGangemi } and { Sr }} , year={2009} , publisher={Reilly& Associates, Inc} , address={New York} } @book{b3, , title={{Library of Congress Cataloging in Publication Data}} , author={{ DorothyEDennin }} , year={1983} , address={Addison-Wesley, USA} , note={Cryptography and Data Security} } @book{b4, , title={{Computer Algorithms}} , author={{ EllisHorowitz } and { SanguthevarRajasekran }} , year={2005} , publisher={Galgotia Publication Pvt. Lid} , address={New Delhi, India} } @book{b5, , title={{Introduction to Algorithms}} , author={{ HThomas } and { CharlesECormen } and { RonaldLLeiseroin } and { Rivest Clifford Stein }} , year={2002} , publisher={Prentice, Hall of India, Pvt. Ltd} 110 1 , address={New Delhi} , note={2nd Ed} } @book{b6, , title={{Cryptography and Network Security: Principles and Practice}} , author={{ WilliamStallings }} , year={2009} , note={3rd Ed. India} }