Figure 3 - uploaded by Kolawole Bariu Logunleko
Content may be subject to copyright.
C.II. Flow Chart of the Base64 Decryption

C.II. Flow Chart of the Base64 Decryption

Source publication
Thesis
Full-text available
Privacy of data is a requirement to be critically considered when such data is to be transmitted or exchanged via a public network. It is therefore a significant challenge and a huge task to secure such data in transmission. This challenge can be addressed via data encryption. The use of encryption restricts unintended recipients from viewing the d...