notesum.ai
Published at November 21Designing a Secure Device-to-Device File Transfer Mechanism
cs.CR
Released Date: November 21, 2024
Authors: Chaitanya Rahalkar1, Anushka Virgaonkar
Aff.: 1Georgia Institute of Technology

| Overall Security | End-to-End Encryption | Source | Intermediary Involved | Eavesdroppers | |
| Google Drive | Account-based | No, keys held by Google | Closed Source | Yes (Google Servers) | Google, CAs |
| WebRTC | DTLS | Yes | Open protocol design, FOSS libs | No (STUN Server to get Public IP) | None. Peer-to-peer design |
| Our Implementation | sPAKE, NaCl Crypto | Yes | Open protocol design | Yes (Relay server) | None, property of PAKE |
| FTP | Password-based access to servers | No | Open protocol design, FOSS libs | Yes (FTP server) | FTP server host |
| TLS | Only in PGP/S-MIME | Open protocol design, FOSS libs | Yes (Mail server) | Mail servers (None in PGP/S-MIME) | |
| SCP | AES, RSA/ ECC, HMAC | Yes | Open protocol design, FOSS libs | No | None |