Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

Improved Cryptographic Algorithm for Secured Peer-to-Peer Communication System

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2021
Jude I. Opuh, Bartholomew O. Eke, Edem E. Williams

Jude I Opuh, Bartholomew O Eke and Edem E Williams. Improved Cryptographic Algorithm for Secured Peer-to-Peer Communication System. International Journal of Computer Applications 183(6):21-28, June 2021. BibTeX

	author = {Jude I. Opuh and Bartholomew O. Eke and Edem E. Williams},
	title = {Improved Cryptographic Algorithm for Secured Peer-to-Peer Communication System},
	journal = {International Journal of Computer Applications},
	issue_date = {June 2021},
	volume = {183},
	number = {6},
	month = {Jun},
	year = {2021},
	issn = {0975-8887},
	pages = {21-28},
	numpages = {8},
	url = {},
	doi = {10.5120/ijca2021921338},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


This study entails pairing peers that indicated interest to communicate in the peer-to-peer system. Subssequently, a peer restricter policy was introduced to ensure systematic and automatic generation of a Communication Identity Code (CIC) for every successfully registered peer and any deviation to manipulate the system display error. This CIC ensure first and only acceptable connection request to a distinct authorized registered peer in the network. The communication identity code guarantees authentication of communicating peers at both end thus displaying a connection established with peer, assuring non-repudiation by the paired peers. The last phase requires activation ,incorporation of diverse agent functionalities that facilitates message exchange of peers and it is imperative to secure every communication from an un-intended recipient peer in this peer-to-peer system using RSA cryptosystem as another security layer.SHA3-1024 was used in extending RSA as it provided added capability in securing the system. The displayed encrypted and decrypted feedback messages assured security, fulfils proactive and goal directed features of agent in this peer-to-peer system.


  1. Androutsellis -Theotokis, S., and S. Diomidis. (2004). A survey of peer-to-peer content distribution technologies, In ACM Computing Surveys, 36(4):335–371.
  2. Moore, D. and J. Hebeler (2002) . Peer-to-Peer: Building Secure, Scalable, and Manageable Networks.
  3. William. S (2014).Computer Security, Third Edition
  4. Bertoni .G, J. Daemen, M. Peeters and G. Van Assche (2011). The KECCAK reference, Version 3.0,
  5. Mohammed. A and P. Annapurna (2012). Implementing a Secure Key Issuing Scheme for Communication in P2p Networks, International Journal of Wireless & Mobile Networks, 4,1.
  6. Vijayakumar, P., R. Naresh, D.Lazarus and I.Hafizul (2016).An efficient group key agreement protocol for secure P2P communication, Security and Communication Networks; 9:3952–3965.
  7. Beverly,Y., and G. Hector (2003). Designing a Super-Peer Network. Proceedings of the 19th International Conference on Data Engineering, 1063-6382.
  8. Ehsan. S and M. Shahriar (2012). Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security,International Journal of Modeling and Optimization. 2, 3.
  9. Gulshan K, S.Anjala and S.Jyoti (2014). Authentication Techniques in ComputerNetworks,International Advanced Research Journal in Science, Engineering and Technology1, (2).
  10. Hexmoor.H and S.Nagalakshmi(2016). Enhancing Reliability in P2P Networks Using Social Capital Principles, Journal of Networks and Systems, 5,(1).
  11. Kasyful. A (2017). Collaborative File Sharing System Using Jxta P2p Networking Infrastructure –AnApplication Development , Journal of Environmental Engineering & SustainableTechnology, 4 (1), 31-40.
  12. Kayalvizhi .K and R.Bharathi(2014). Efficient and Distributed Network Model for Peer-to-peer Systems, International Journal of Computer Science and Mobile Computing, 3, (2), 626-632.
  13. Keong.L, C. Jon ,P. Marcelo ,S. Ravi and L.Steven (2004). A Survey and Comparison of Peer-to-Peer Overlay Network Schemes, IEEE Communications.
  14. Khalid .K(2015).Mobile Agent: A Comparison Review, International Journal of Computer ScienceandMobileComputing,4,(7),122-127.
  15. Rajeev Sobti and G. Geetha (2015). Performance Comparison of Keccak, Skein, Grøstl, Blake and JH: SHA-3,Final Round Candidate Algorithms.International Journal of Security and Its Applications ,9, (12 ),367-384.
  16. Rajesh.K, P.Suman and K.Vinod (2016). A Survey of Peer-to-Peer Networks, International Journal of Advanced Research in Computer and Communication Engineering.5, (4)
  17. Xu.Y, C. Deng and M. Gao (2012).The Topology of P2P Network, Journal of emerging trends in computingand information sciences.,3 ,8 , 2079-840
  18. Arvind, N., J. Bonneau, F.Edward, M. Andrew and G. Steven.(2015) . Bitcoin and Cryptocurrency Technologies, Princeton Pu Ltd, USA.
  19. Bertoni .G, J. Daemen, M. Peeters and G. Van Assche (2011). The KECCAK reference, Version 3.0,


Peer-to-peer, Communication Identity Code, Secure Hash Algorithm, Encryption and Decryption