1. Clement J. (2020). Cyber crime: number of breaches and records exposed 2005–2020. Retrieved from https://www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/
2. Kester QA, 2013. A Hybrid Cryptosystem based on Vigenere cipher and Columnar Transposition cipher. arXiv preprint arXiv:1307.7786
3. Basu S (2011) International Data Encryption Algorithm (Idea)–A Typical Illustration. J Global Res Comput Sci 2(7):116–118
4. Mousa A, Hamad A (2006) Evaluation of the RC4 algorithm for data encryption. IJCSA 3(2):44–56
5. Rivest RL (1994) The RC5 encryption algorithm. In: International Workshop on Fast Software Encryption (pp. 86–96). Springer, Berlin, Heidelberg