Fig. 1. Creation of Secret Key
The figure number 02 illustrates the process of encryption and
decryption. The encryption is done at the sender end using the
attributed received from the receiver. From the example below, the
attributes with which the data is encrypted is based on the mathematical
combination operations such AND and OR. The identities used for
encryption are Mathematics department and that the person is either into
PhD or MSc degree within the mathematics Department. Once the data is
encrypted using the combination of attributes, the cipher will be send
to the user (receiver).