Key Maker

Keys generation :
Decryption page : Not ready
Encryption page : Not ready
  1. Alice wants to send a file to Bob
  2. Bob uses the Key Maker and saves both pages
  3. Bob sends the Encryption page to Alice
  4. Alice encrypts the file using the encryption page
  5. Alice publishes the encrypted file on any cloud
  6. Bob downloads the encrypted file
  7. Bob decrypts the file using the decryption page