Need of Security in File Transfer
Preventing Unwanted Users from Accessing Files
Flow Chart
Server
Peer A
Peer B
Peer A sends a query to the central server for a file. Here, the central server stores the list of all files along with the IP address of the peers containing the file.
Server
Peer A
Peer B
2. Server searches the queried file and return the IP address of the peer B which contains the required file.
Server
Peer A
Peer B
3. Peer A generates public and private key using RSA algorithm.
3
Server
Peer A
Peer B
4. Peer A then sends the File Request & public key to Peer C and keep the private key with itself.
Server
Peer A
Peer B
5. Peer B encrypt the required file by using A’s public key.
5
Server
Peer A
Peer B
6. B sends the encrypted file to A
Server
Peer A
Peer B
7. Since A has the private key, hence it will decrypt the file using it’s private key.
7
Areas of Use