Secure File Transfer in Peer to Peer Network
- Saksham (13114049)
- Priyanka Jain (13114039)
- Rahul Agarwal (13114041)
- Rishabh Bansal (13114045)
- Veena Rani Meena (13114070)
Need of Security in File Transfer
Preventing Unwanted Users from Accessing Files
Flow Chart
Server
Peer A
Peer B
-
Peer A sends a query to the central server for a file. Here, the central server stores the list of all files along with the IP address of the peers containing the file.
Server
Peer A
Peer B
2. Server searches the queried file and return the IP address of the peer B which contains the required file.
Server
Peer A
Peer B
3. Peer A generates public and private key using RSA algorithm.
3
Server
Peer A
Peer B
4. Peer A then sends the File Request & public key to Peer C and keep the private key with itself.
Server
Peer A
Peer B
5. Peer B encrypt the required file by using A’s public key.
5
Server
Peer A
Peer B
6. B sends the encrypted file to A
Server
Peer A
Peer B
7. Since A has the private key, hence it will decrypt the file using it’s private key.
7
Areas of Use
- In most of file sharing systems, Files are going to be encrypted at a server side and public and private keys are forwarded to the client
- Since Both keys are sent into the network, there are possibility of snooping of keys.
- In our system we are creating keys at Client side and send only public key and since private key never gets into Network so chances of someone other than client of decrypting are very slim.
- So our Project can be used in every area where we implement secure file transfer
deck
By Saksham Arya
deck
- 509