“…Initially, a random key is used to encrypt the first block and the subsequent key streams are generated by our cryptosystems based on the below function. The output of the above algorithm produces the key streams from the Jump graph of a web graph starts from 1, 1, 2, 3,4,5,6,1,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25, 26 by doing equivalence modulo 26.…”