In modern days cryptography is no longer limited to
secure sensitive military information but recognized as
one of the major components of the security policy of
any organization and considered industry standard for
providing information security, trust, controlling access
to resources, and electronic financial transactions. The
which recuperate the original data. Since cryptography
first known usage in ancient Egypt it has passed through
different stages and was affected by any major event that
affected the way people handled information. In the
World War II for instance cryptography played an
important role and was a key element that gave the
allied forces the upper hand, and enables them to win
the war sooner, when they were able to dissolve the
Enigma cipher machine which the Germans used to
encrypt their military secret communications [2].
Original data that to be transmitted or stored is called
plaintext, the one that can be readable and
understandable either by a person or by a computer.
Whereas the disguised data so-called ciphertext, which is
unreadable, neither human nor machine can properly
process it until it is decrypted. A system or product that
provides encryption and decryption is called
cryptosystem [3]. Cryptosystem uses an encryption
algorithms which determines how simple or complex the
encryption process will be, the necessary software
component, and the key (usually a long string of bits),
which works with the algorithm to encrypt and decrypt
the data [3], [4]. In the 19th century, a famous theory
about the security principle of any encryption system
has been proposed by Kerchhoff. This theory has become
the most important principle in designing a