Research Article
Analysis of Data Encryption Algorithms for Telecommunication Network-Computer Network Communication Security
Table 5
PC1 and PC2 transformation.
| PC-1 | PC-2 |
| 57 | 49 | 33 | 17 | 18 | 14 | 17 | 11 | 1 | 5 | 1 | 58 | 42 | 26 | 9 | 3 | 28 | 15 | 21 | 10 | 10 | 2 | 51 | 35 | 27 | 23 | 23 | 12 | 26 | 8 | 19 | 11 | 60 | 23 | 15 | 16 | 7 | 27 | 13 | 2 | 63 | 25 | 36 | 37 | 22 | 30 | 52 | 31 | 47 | 48 | 7 | 62 | 45 | 12 | 29 | 14 | 42 | 51 | 33 | 53 |
|
|