@incollection{, F68DB22FA26787B8D2667BEE28B76ACC , author={{Neymis MisikoJacob} and {Umma University}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}19113 } @book{b0, , author={{ CBradford }} , title={{Storagecraft Recovery Zone. Retrieved from 5 Common Encryption Algorithms and the Unbreakables of the Future}} , year={2016. July 31st} } @incollection{b1, , title={{Algorithm: A Technique for Encryption & Decryption}} , journal={{International Journal of Latest Trends in Engineering and Technology (IJLTET)}} } @incollection{b2, , title={{}} , author={{ PriyankaArora } and { ArunSingh } and { HimanshuTyagi }} , journal={{Evaluation and Comparison of Security Issues on Cloud Computing Environment. World of Computer Science and Information Technology Journal}} , year={2014} } @book{b3, , title={{Making Good Encryption Algorithms}} , author={{ CharlesPPfleeger } and { ShariLawrence }} , editor={C. P.} , year={2006} } @book{b4, , title={{}} , author={{ Pfleeger }} , publisher={Pearson Education, Inc} , address={Upper Saddle River, NJ 07458 USA} , note={Security in Computing 4th Edition (pp.} } @incollection{b5, , title={{A Review and Comparative Analysis of Various Encryption Algorithms}} , author={{ RajdeepBhanot } and { RahulHans }} , journal={{International Journal of Security and Its Applications}} , year={2015} } @incollection{b6, , title={{Study of Symmetric key Cryptography Algorithms}} , author={{ .R DRejani }} , journal={{International Journal of Computer Techniques}} , year={2015} } @book{b7, , title={{Brute force cracking}} , author={{ MRouse }} , year={2006. July} } @book{b8, , title={{Cryptanalysis and Attacks}} , author={{ GHeward }} , year={2014. January 26th} } @incollection{b9, , title={{Performance Analysis of Different Cryptography Algorithms}} , author={{ Md } and { MdHossain } and { Biddut Hossain }} , journal={{International Journal of Advanced Research in Computer Science and Software Engineering}} , year={2016} , note={Md. Shafin Uddin, Shariar Md. Imtiaz.} } @book{b10, , title={{An Overview of Cryptography}} , author={{ GCKessler }} , year={2017} , publisher={McGraw-Hill} , address={Australia} } @incollection{b11, , title={{A Methodology for the Pseudonymization of Medical data}} , author={{ TNeubauer } and { JHeurix }} , journal={{International Journal of Medical Information}} , year={2011} } @incollection{b12, , title={{Vulnerability of data security using MD5 function in php database design}} , author={{ JMNeyole }} , journal={{International Journal of Science and Engineering}} , year={2015} } @incollection{b13, , title={{A Study of Encryption Algorithms AES, DES and RSA for Security}} , author={{ PrernaMahajan } and { AbhishekSachdeva }} , journal={{Global Journal of Computer Science and Technology Network}} , year={2013} , note={Web & Security} } @book{b14, , title={{}} , author={{ VPriti } and { KaustubhSBhagat } and { Satpute } and { RVikas } and { Palekar }} , year={January 2013} , note={Reverse Encryption} }