Text this: Securing m-government transmission based on symmetric and asymmetric algorithms: A review