“…Subsequently many research on transposition and substitution ciphers were conducted by different researchers such as [11], [13] and [15]. Many discussions on transposition and substitution ciphers were made [5], [7], [9], [12] and [17] evaluates the security of transposition ciphers using stack approaches, [1], [20] and [22] discusses a combination of two independent ciphers for a better securing of a data over a communication channels, [4], [6], [8] and [10] investigated enhancement of Ceaser cipher method, [15] discusses an approaches in improving transpositions cipher systems, [16] on modified Ceaser cipher for a better security situations, Azzam and [18] discusses a strong cipher text by combining Hill and Substitution Ciphers, and [14] on modification of an Affine ciphers algorithm for cryptography password. Cryptographic techniques uses two fundamental systems which are symmetric (secret key) and asymmetric (public key), in this study we use a symmetric key for both encryption and decryption.…”