Abstract: In the context of the current diversification of network attacks, it is evident that the traditional single encryption algorithm is no longer sufficient to meet the requisite security ...