
Secure Peer to Peer File Sharing Application With End to End Encryption | IJET – Volume 12 Issue 2 | IJET-V12I2P85

Table of Contents
ToggleInternational Journal of Engineering and Techniques (IJET)
Open Access • Peer Reviewed • High Citation & Impact Factor • ISSN: 2395-1303
Volume 12, Issue 2 | Published: April 2026
Author: Mohamed Imran M, Metildamary S, Mitheela K, Suvasthika N, Nidhya K
DOI: https://doi.org/{{doi}} • PDF: Download
Abstract
This project presents a Secure Peer-to-Peer File Sharing Application with End-to-End Encryption (E2EE) to ensure data privacy and security during transmission. Traditional file sharing systems are vulnerable to data breaches, unauthorized access, and dependency on centralized servers. The proposed system overcomes these issues by using a decentralized peer-to-peer architecture. It implements Advanced Encryption Standard (AES) for data encryption and RSA algorithm for secure key exchange, ensuring that only authorized users can access the shared files. End-to-end encryption protects data from interception and tampering. The system also includes secure key management and user authentication to enhance security. It supports efficient real-time file transfer with minimal delay. Overall, the proposed solution provides a secure, reliable, and scalable approach for modern file sharing needs. Keywords— Peer-to-Peer (P2P), End-to-End Encryption (E2EE), AES, RSA, Secure File Sharing, Data Security.
Keywords
{{keywords}}
Conclusion
The proposed system successfully implements a secure peer-to-peer file sharing application that ensures safe and reliable transmission of files between sender and receiver. The system utilizes advanced cryptographic techniques such as Elliptic Curve Diffie-Hellman (ECDH) for secure key exchange, HKDF for key derivation, and AES-256- GCM for encryption, providing strong data confidentiality and integrity. The encryption mechanism ensures that file contents remain protected throughout transmission, while authentication tags help detect any tampering attempts. The use of TCP protocol guarantees reliable and ordered data transfer between communicating devices. Additionally, the generation of temporary session keys enhances security by protecting each communication session from unauthorized access. Overall, the proposed system demonstrates an effective and practical approach for securing data during file sharing and highlights the importance of integrating cryptographic techniques in modern secure communication systems.
References
1.Diffie and M. Hellman, “New Directions in Cryptography,” IEEE Transactions on Information Theory, vol. 22, no. 6, pp. 644–654,
1976.
2.R. L. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120–126, 1978. 3.National Institute of Standards and Technology (NIST), “Advanced Encryption Standard (AES),” FIPS PUB 197, 2001.
4.H. Krawczyk and P. Eronen, “HMAC-based Extract-and-Expand Key Derivation Function (HKDF),” RFC 5869, 2010.
5.V. S. Miller, “Use of Elliptic Curves in Cryptography,” Advances in Cryptology— CRYPTO, 1985.
6.D. J. Bernstein, “Curve25519: New Diffie- Hellman Speed Records,” Public Key Cryptography, 2006.
7.B. Cohen, “Incentives Build Robustness in BitTorrent,” Workshop on Economics of Peer-to- Peer Systems, 2003.
8.A. Langley et al., “The QUIC Transport Protocol: Design and Internet-Scale Deployment,” ACM SIGCOMM, 2017.
9.M. Green and M. Smith, “The Cryptopals Crypto Challenges,” Cryptography Engineering, 2016.
10.
K. P. Scarfone and P. Mell, “Guide to Intrusion Detection and Prevention Systems (IDPS),” NIST Special Publication, 2007.
11.C. Paar and J. Pelzl, Understanding Cryptography: A Textbook for Students and Practitioners, Springer, 2010.
12.W. Stallings, Cryptography and Network Security: Principles and Practice, 7th ed., Pearson, 2017.
Cite this article
APA
{{author}} (April 2026). {{title}}. International Journal of Engineering and Techniques (IJET), 12(2). https://doi.org/{{doi}}
{{author}}, “{{title}},” International Journal of Engineering and Techniques (IJET), vol. 12, no. 2, April 2026, doi: {{doi}}.
