Introduction - If you have any usage issues, please Google them yourself
This paper presents a P2P network in the distribution of key security and authentication of the peer approach. This method of authentication protocol used in connection with a public key encryption and key encryption technology. We are also certified through a method of testing proved that the method used in the correctness of the security authentication protocol.