Open Access Open Access  Restricted Access Subscription or Fee Access

An Effective and Secure Key Management Scheme in Multiphase Cryptosystem

Manoj Kumar Pandey, Prateeksha Pandey


One of the important aspects of network security is the security of data being communicated.  The secret data can be obtained by unwanted users for poisonous purpose therefore its essential to apply efficient encryption algorithm to increase data security like Multiphase Encryption algorithm using an efficient technique for managing keys being used for encryption and decryption.  This paper mainly focuses on implementation of the multiphase cryptosystem using AES, 3DES and management of keys using RSA algorithm.


Data Security, AES, 3DES, RSA, Encryption, Multiphase Encryptions, Data Verification.

Full Text:



Jawahar Thakur, Nagesh Kumar “DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis”, International Journal of Emerging Technology and Advanced Engineering, Volume 1, Issue 2, December 2011, ISSN 2250-2459.

E.Thambiraja, G. Ramesh and Dr. R. Umarani. “A Survey on Various Most Common Encryption Techniques”, International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 7, July 2012.

Shraddha Soni, Himani Agrawal, Dr. (Mrs.) Monisha Sharma “Analysis and Comparison between AES and DES Cryptographic Algorithm”, International Journal of Engineering and Innovative Technology (IJEIT), Volume 2, Issue 6, December 2012, ISSN: 2277-3754.

Yogesh Kumar, Rajiv Munjal, Harsh Sharma, “Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures”, International Journal of Computer Science and Management Studies, Vol. 11, Issue 03, Oct 2011.

Posch, K. C., Posh, R., ―Designing a new encryption method for optimum parallel performance, IEEE First International Conference on Algorithms and Architectures for Parallel Processing, Brisbane, Qld., Australia 1995.

Ravindra Kumar Gupta, Parvinder Singh, “ A New Way to Design and Implementation of Hybrid Crypto System for Security of the Information in Public Network”, International Journal of Emerging Technology and Advanced Engineering, Volume 3, Issue 8, August 2013, ISSN 2250-2459.

Coppersmith, D. "The Data Encryption Standard (DES) and Its Strength against Attacks."I BM Journal of Research and Development, May 1994, pp. 243 -250.

Manoj Kumar Pandey, Mrs. Deepty Dubey, “Survey Paper: Cryptography The art of hiding Information”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 12, December 2013.

W.Stallings, ''Cryptography and Network Security 4th Ed,'' Prentice Hall, 2005.

Himanshu Gupta,Vinod Kumar Sharma, “Multiphase Encryption: A New Concept in Modern Cryptography”, International Journal of Computer Theory and Engineering, Vol. 5, No. 4, August, pp 638-640, 2013.

Himanshu Gupta,Vinod Kumar Sharma, “ROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTION”, International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November2011.

Razieh Mokhtarnameh, Nithiapidary Muthuvelu, Sin Ban Ho, Lan Chai “A Comparison Study on Key Exchange-Authentication Protocol”, Faculty of Information Technology, Multimedia University, Jalan Multimedia, 63100 Cyberjaya, Selangor, Malaysia, International Journal of Computer Applications (0975 – 8887)Volume 7– No.5, September 2010.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.