Return to Article Details Develop data encryption by using mathematical complement Download Download PDF