Abstract
The use of encryption and decryption techniques for securing communication is as old as the art of communication. Technically, a code is used instead of data which is a signal for intent to keep data secret. In order to recover the contents from an encrypted signal, accurate decryption key is needed. The key is basically an algorithm that is used to reverse the work of the encryption technique and get original form of data. There is always a potential threat from hackers to decode encrypted signal, to avoid such issues specialized intellectuals have worked hard and defended these threats by developing more ...