A blog by Devendra Tewari
The secure file transmission mechanism, depicted in the diagram below, has the following properties
Authentication
Alice has a unique securely-held private key
Non-repudiation
Alice has a unique securely-held private key
Data Integrity
Program signs data using Alice’s private key
Data Confidentiality
Program encrypts data using Alice’s private key
graph LR
Program-->data[Encrypted Data]
data-->Service
subgraph Alice
priva[Alice's Private Key]-->Program
pubb[Server's Public Key]-->Program
file1[File]-->Program
end
subgraph Server
privb[Server's Private Key]-->Service
puba[Alice's Public Key]-->Service
Service-->file2[File]
end
Here’s how the mechanism works