Premium Essay

Nt1330 Unit 5 Algorithm Report

Submitted By
Words 1096
Pages 5
IMPLEMENATION
For providing security in peer to peer network we are using the AES algorithm and MD5 algorithm. AES for converting the plain text into cipher text which is been sent to the peers from the other peer. For password generator we are using the MD5 algorithm which uses the hash value for providing the total integrity while sharing the data among the peers. For secure communication using the secrete key of the cryptographic algorithm.
Connection between the two peers will be established using the socket programming in both the peers will be connected using the mini server of a particular client from which data has to be shared. This connection is not a powerful connection and it also does not show the concept of handshaking. So establishing …show more content…
At the last when the file is send to other peer then extra security is added to file and the message which is sent to the peer, just put the string text in the MD5 generator which will generate the hash value and send to the recipient for the integrity purpose. When the file is received then the other peer will put the string in the MD5 generator and generate the hash value , if the hash value are identical then he got the same file send by the sender.
The same methodology is been used by the other members by using the DES algorithm for file sharing which can easily be cracked and we have just replaced is by doing the work with the AES algorithm which will provide the more security to data which is been shared among the peers. We have also put the concept of file compression because file is taking a time to be received at the receiving end. After compressing the file it will decrease its length and it will be encrypted fast and send over the

Similar Documents