Suppose there are n c users A (clients) want to securely access the files stored in the database of a user B (server). At first, each client will make a connection using socket with the server B and then will establish three symmetric keys, say K 1 , K 2 and K 3 which will be used for encryption and decryption using the 3DES with three keys symmetric cryptosystem.