Return to Article Details Encryption Protocol using some Pieces of Message as Key Download Download PDF