CFP last date
20 March 2024
Reseach Article

Proposing 3SEMCS- Three Step Encryption Method for Cyber Security in Modern Cryptography

by Manraj Singh, Amit Kumar, Shubham Chuchra, Navreet Kaur, Sajan Dhawan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 139 - Number 6
Year of Publication: 2016
Authors: Manraj Singh, Amit Kumar, Shubham Chuchra, Navreet Kaur, Sajan Dhawan

Manraj Singh, Amit Kumar, Shubham Chuchra, Navreet Kaur, Sajan Dhawan . Proposing 3SEMCS- Three Step Encryption Method for Cyber Security in Modern Cryptography. International Journal of Computer Applications. 139, 6 ( April 2016), 6-16. DOI=10.5120/ijca2016908302

@article{ 10.5120/ijca2016908302,
author = { Manraj Singh, Amit Kumar, Shubham Chuchra, Navreet Kaur, Sajan Dhawan },
title = { Proposing 3SEMCS- Three Step Encryption Method for Cyber Security in Modern Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { April 2016 },
volume = { 139 },
number = { 6 },
month = { April },
year = { 2016 },
issn = { 0975-8887 },
pages = { 6-16 },
numpages = {9},
url = { },
doi = { 10.5120/ijca2016908302 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-06T23:40:11.346136+05:30
%A Manraj Singh
%A Amit Kumar
%A Shubham Chuchra
%A Navreet Kaur
%A Sajan Dhawan
%T Proposing 3SEMCS- Three Step Encryption Method for Cyber Security in Modern Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 139
%N 6
%P 6-16
%D 2016
%I Foundation of Computer Science (FCS), NY, USA

Cyber security is a critical issue now a days in various different domains in different disciplines. This paper presents a review analysis of cyber hacking attacks along with its experimental results and proposes a new methodology 3SEMCS named as three step encryption method for cyber security. By utilizing this new designed methodology, security at highest level will be easily provided especially on the time of request submission in the search engine as like google during client server communication. During its working a group of separate encryption algorithms are used. The benefit to utilize this three step encryption is to provide more tighten security by applying three separate encryption algorithms in each phase having different operations. And the additional benefit to utilize this methodology is to run over new designed private browser named as “RR” that is termed as Rim Rocks correspondingly this also help to check the authenticated sites or phishing sites by utilizing the strategy of passing URL address from phishing tank. This may help to block the phisher sites and user will relocate on previous page. The purpose to design this personnel browser is to enhance the level of security by sign_in on the time of client server communication that correspondingly reduce the normal attacks on browser based attacks as like Man- In-The-Middle-Attack (MITMA). This new designed private browser may help to provide online security by applying 3-step automatic encryption on path during request movement of google page from the one to the next or ultimately/towards web server by following auto-generated encrypted hash address approach. At end, this rim rocks browser provides tighten security with anti-phishing facility during client server communication.

  1. Sr.Analyst,,Sr.Chiranshu Ahuja and Atul Kumar. Cyber Security Research Developments, DSCI (Promoting Data Protection).
  2. Privacy and Cyber Security-Emphasizing Privacy Protection in Cyber Security Activities, December-2014.
  3. Geneva, A Comparative Analysis of Cyber Security Initiatives Worldwide, International Telecommunication Union.
  4. Michal Bailey and Erin Kenneally, Cyber Security Research Ethics Dialogue and Stategy Workshop, CCR Online, USA.
  5. Emergance of Cyber Security Law, Febuary-2015. Prepared for the Indiana University Maurer School of Law by Hanover Research, Indiana University Bloomington.
  6. Developing our capability in cyber security, Academic Centers of Excellence in Cyber Security Research, HM Government.
  7. Rossouw von Solms and Noluxolo Kortjan, July -2014.A conceptual framework for cyber-security awareness and education in SA, School of ICT, South Africa.
  8. Robert Menshaw,2012.NSA initiatives in Cyber Security Science-The Next Wave.
  9. Aaron Burstein, Conducting Cyber Security Research Legally and Ethically, School of Law, University of California.
  10. Sanjay Rai, 2014. Cyber Security - IIARF Research Report, The institute of Internal Auditors Research Foundation.
  11. David Whyte, D’Arcy Walsh and Dan Craigen,July-2013.Securing Canada’s Information Technology Infrastructure: Context, Principles and focus areas of Cyber Security Research.
  12. Eduard Hovey and David Kepler, A Taxonomy and a knowledge portal for cyber security, US.
  13. Fabio Elia, Henry Z.Lo,Joseph P Chen,Ronald S.cheung, Challenge Based Learning in Cyber Security Education ,University of Massachusetts,USA.
  14. Rita Tehan,2014.Cyber Security: - Authoritative Reports and Resources by topic, Federal Publications, Digital Commons, ILR, Corell University.
  16. First Cluster Workshop on Cyber Security in FP7 Security & Trust Research Projects-Report,Co=Organized with CYSPA.//
  17. Tobby Simon & Michal Chertoff, Febuary-2015. The Impact of the dark web on Internet Governance & Cyber Security, Global Commission on internet governance.
  19. Marco Spruit and Tjalling Reijmer, March-2014.Cyber Security in the news-Technical Report, Netherland.
  20. Sara Sinclair and Michael E.Locasto,2009.An experience Report on Undergraduate Cyber-Security Education & Outreach, ACEIS,USA.
  22. G.J.U Gander Reddy and G.Nikhita Reddy,A Study of Cyber Security Challenges and its emerging trends on latest Technologies”, Osmania University, Hyderabad, India.
  23. Deanna D.Caputo and Shari Lawrence Pfleeger,2012.Leveraging Behavioral Science to Mitigate Cyber Security Risk”, MITRE Corporation.
  24. Dr. George and A Wright, Cyber Security: Designing and Maintaining Resilience, Georgia Technical Research Institute of Cyber Technology and information, Security Laboratory.
  25. Pankaj Kumar Kesetewani, Abhishek Vaish and Aniruddha Singh, January-2014. Information Security: Components and techniques.
  26. Dipankar Dasgupta,Yunyue Lin,Denise Ferebee and Qishi Wu,An Integrated Cyber Security Monitoring System Using Co-relation Based Techniques, University of Memphis.
  27. Sachin Goyal,Ratish Aggarwal and Raghav Gupta,April-2014. A Review of Cyber Security Techniques for critical Infrastructure Protection,International Journal of Computer Science and Engg. Technology.
  28. Terry Benzel, The Science of Cyber Security Experimentation the DETER Project,USC Information Science Institute.
  29. Adil Yousif,Adil Ali A. Alaziz,Othman Ibrahim,Nadir Omer Fadl Elessied,2011,Review-Paper: Security in E-Government Using Fuzzy Methods,International Journal of Advanced Science and technology.
  30. RH Goudar,Bina Kotiyal and Priti Saxena,April-2012.A Cyber Era Approach for Building Awareness in Cyber Security For Educational System in India ,International of information and education technology.
  31. Ateeq Ahmad,Type of Security Threats and its prevention, International Journal of Computer Technology and Applications.
  32. Kadoleayashi Youki and Takahashi Takeshi, Cyber Security Information Exchange Techniques: Cyber Security Information Ontology and CYBEX.
  33. Salvatore Stolfo, Ramawamy Devarajan and Brian Bowen, Measuring the human factor of cyber security, Columbia University.
  34. John Suffolk, Oct-2013.Cyber Security Prospectives:-Making Cyber Security a part of Companies, DNA-A set of integrated Processes, Polices and Standards, Huawei Technologies.
  35. Tamara G.Kolda and Daniel M.Dunlavy and Bruce Hendrickson, Feb-2009.Mathematical Challenges in Cyber Security,Sandia Laboratory-Unlimited Release,California.
  36. Yasuko Fukuzawa,Kunihiko Miyazaki,Makoto Kayashima and Satoshi Takemoto,2014.Trends in Cyber Security and Latest Countermeasures, Hitachi Review.
  37. Iulian Neamtiu and Tudor Dumitras, Experimental Challenges in Cyber Security: A story of Provenance and Lineage for Malware -white paper, University of California.
  38. Research Report on IBM Security Services 2014:- Analysis of Cyber Attack and incident data from IBM’s Worldwide security operations, IBM Global Technology Services.
  39. Vinod Kumar Sharma and Himanshu Gupta,Augst-2013.Multiphase Encryption:- A new concept in Modern Cryptography, International Journal of Computer Theory and Engg.
  40. Tommie Singleton,October-2013.The top 5 Cyber Crime, American Institute of CPA’S.
  41. Lockheed Martin Corporation and Mical Muckin and Scott C.Fitch,A Threat-Driven approach to cyber security, Lockheed Martin Co-orporation.
  42. Pekka Vepsalainen and Angeliki Tsocholl, 2014. ”Strategic Research Agenda for Cyber Trust,DIGLE.
  43. Ramlan Mahmoud,Ali Dehgantanha and Mohsen Damshenas,2013. A survey on Malware Propoagation,analysis and Detection,International journal of cyber security and digital Forensis.
  44. R.K Seth, Rimmy and Shubham Chuchra, May-2015, Proposing Operational Technology based procedure (OTBP) Using Round Robin Scheduling Algorithm, International Journal of Computer Applications.
  45. Rimmy Chuchra and R.K Seth, December-2013. On the mechanism of detection and Prevention from Phishing Attacks By Analyzing Attacker Behavior ,International Journal of Advanced Research in Computer Science and Software Engg.
  46. Rimmy Chuchra and Bharti Mehta, April-2013.Use of Web Mining in Network Security, International Journal of Emerging Technology and Advanced Engg.
  47. Kruegel Christopher & Kirda Engin,Protecting users against phishing attacks with Antiphish,White paper, Technical University of Vienna.
  48. Reddy Madhusudaan V.C, Safar Vidya.U,October-2013.Intelligent phishing website detection and prevention system by using link guard algorithm,Journal of Computer engineering.
  49. N.Banu Shaira and Mohideen Mohammed,Febuary-2014.Email Phishing-An open threat toi everyone,International Journal of scientific & research publications.
  50. Cranston Christopher,Anti-Phishing as a web based user service,University of Strachlyde,UK.
  51. Salleh Mazleenaa and Zeydan Zuhair Hiba, December-2014.Current state of anti-phishing approaches and revealing competencies, Journal of Theoretical and applied information technology.
  52. Cranor Lorrie and Hong Jason,2007.CANTINA-A Content based approach to detecting phishing web sites, International world wide web conference committee,Canada.
  53. Wu.M and R.Miller,April-2006.Do security toolbars actually prevent phishing attacks?, In proceedings of ACM Conference on Human Factors in computing systems.
  54. Khan Khalid Muhammad and Memon Khan Imraan, March-2013.Anti-Phishing for mid-range mobile phones, International Journal of computer and communication engineering.
  55. Wolman Alec, Saroin Stefan and Ronda Troy, iTrust Page: A User assisted anti-phishing tool, UK.
  56. Abhyankar Asmita and Rewadkar.N.D, 2014.A Reviews of anti-phishing Framework based on visual cryptography, International journal of science and research.
  57. Kruegel Christopher and Kirda Engine,On the effectiveness of techniques to detect phishing sites, Technical university Vienna.
  58. Shukla Kumar and Piyush,2015.System Design-Investigation and Countermeasure of Phishing Attacks using Data Mining Classification Methods and Its Analysis. International Journal of Advanced Science and Technology.
  59. Wang HAINING AND Yue Chauan, Anti-Phishing is offence & defense. The college of William and Marry.
  60. B.Vani Maddhura and M.Reddy,September-2013. A novel anti-phishing framework Based on Visual Cryptography, International Journal in Computer and Communication.
  61. Baj.S,Divekar Vishal and Malwade Ashutosh,March-2014. An enhanced anti-phishing framework based on visual cryptography, International journal of emerging research in management and technology.
  62. Sarje.K Anil and Oberoi Kapil,An anti-phishing application for end user.
  63. Xin Yang and Ouyang Xi, April-2012.An empirical analysis of the effectiveness of browser based anti-phishing solutions, International Journal of digital content technology and its applications.
  64. Mishra Varsha ,June-2014.A survey of various anti-phishing techniques, Universe of emerging technologies and science.
  65. Punjyaban Patel and Deeply Dubey,December-2015. Secured Techniques of anti-phishing in cryptography: A Review., International Journal of innovative research in computer and communication engg.
  66. Schmitz Poland and Li Shujan, 2009.A Novel Anti-Phishing Framework based on HoneyPots,Proceedings of fourth annual APWG ecrime researchers summit(ECRS),IEEE.
  67. Lee Ju Isug and Ku-Heng Ching, Building a frame based anti-phishing model based on phishing ontology.
  68. Tabasco Alexdendra and Luner Ion,2010.OPptimizing anti-phishing solutions based on user awareness, education and the use of latest web security solutions, Informatics Economica.
Index Terms

Computer Science
Information Sciences


hash address encryption algorithm Private browser Search Engine Index Pointer Uniform Resource Locator Address and Internet cyber-security law Ethics.