Fig. 7
From: Enhanced security of affine ciphers using digraph transformation and a modified three pass protocol

Comparison of algorithms by decryption time.
From: Enhanced security of affine ciphers using digraph transformation and a modified three pass protocol

Comparison of algorithms by decryption time.