ABSTRACT

Of course, there are lots of algorithms implemented and, as the time passes, they are more and more sophisticated, in order to prevent hackers’ intrusions [1]. Every algorithm tries to operate on the data to be transmitted so that it might be protected against unauthorized “readers.”