Secure File Sharing System Using Advanced Cryptography”

Om Mohapekar*, Prashik Ramteke**, Tanmay Bawankar***, Tejas Zodape****
*-**** Department of Computer Science and Engineering, S. B. Jain Institute of Technology, Management and Research, Nagpur, India.
Periodicity:July - December'2025

Abstract

Using post-quantum encryption, asymmetric and symmetric cryptography, and digital signatures, this study offers a sophisticated cryptographic file-sharing system that guarantees data integrity, confidentiality, and authenticity. Elliptic Curve Digital Signature Algorithm (ECDSA) for authentication, Advanced Encryption Standard (AES) for file encryption, and Kyber for key generation and exchange are all integrated into the suggested system. Furthermore, three-factor authentication (3FA) including password, OTP verification and face recognization is used to improve system security during login. The solution is suitable for both personal and business file- sharing applications since experimental results demonstrate how well it reduces security flaws while preserving performance.

Keywords

Advanced Cryptography, Data Encryption, Decryption, Confidentiality, Integrity.

How to Cite this Article?

Mohapekar, O., Ramteke, P., Bawankar, T., and Zodape, T. (2025). Secure File Sharing System using Advanced Cryptography. i-manager’s Journal on Digital Forensics & Cyber Security, 3(2), 27-35.

References

[5]. Patel, P. K., Vaidya, C., & Dhote, P. (2020). Result analysis of hidden identity mechanism for file storage server. Advances and Applications in Mathematical Sciences, 20(2), 203–210.
[9]. Vaidya, C., Khobragade, P., & Golghate, A. (2016). Data leakage detection and security in cloud computing. GRD Journals Global Research Development Journal for Engineering, 1(12), 137-140.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 40 40 300
Online 15 15 300
Pdf & Online 40 40 300

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.