Return to Article Details Enhancing the Hill Cipher with a Three-Pass Protocol Approach Download Download PDF