... | ... | @@ -2,7 +2,7 @@ |
|
|
|
|
|
To understand how the TT works, it helps to look at a diagram. In the example on below, Labo1 wants to send DNA sequences of bacteria/viruses in a protected manner. To do so, the data exchange will rely on asymetric/public key encryption. The SPSP server has a public key and a private key, which are two mathematically related encryption keys. The public key can be shared with any laboratory, but only the SPSP server has the private key.
|
|
|
|
|
|
First, Lab1 uses the TT to compress the sequences files (*.fastq) and metadata file (*.xlsx) into a tar.gz archive.
|
|
|
First, Lab1 uses the TT to compress the sequences files and metadata file into a tar.gz archive.
|
|
|
Then, the TT generates a unique hash of the previously generated archive using SHA-256 algorithm, meaning that if the content changes even slightly, the hash will be completely different.
|
|
|
After that, the TT uses SPSP’s public key to encrypt the archive, turning it into something scrambled.
|
|
|
Finally, the encrypted archive and the hash are uploaded using SFTP protocol which runs over the SSH protocol (which provides communication security and strong encryption).
|
... | ... | |