Over the use of peer-to-peer encryption, businesses are able to establish private communication channels between devices or parts of devices, ensuring that no intermediary devices are able to decipher important data as it travels over the network. To safeguard sensitive information like credit card details, PIN numbers, and passwords, privacy is essential. Rather of being handed down orally, this kind of knowledge may be exchanged digitally using messaging programs such as WhatsApp or Facebook Messenger.Most of these apps use what is known as peer-to-peer encryption, a kind of two-way communication in which no one other than the two parties involved can decipher the communications transmitted and received. It is necessary to remember the master password in order to access the password safe, which stores all the passphrases in one account. Other malevolent bots and hackers are prompted to plot an assault and attempt to breach the system by this strategy.Therefore, we provide an encryption technique in our suggested work that relies on the authentic user's facial landmarks. Since it is very difficult, if not impossible, to replicate all of the face characteristics in order to fool the authentication system, this method is extremely strong. To determine the legitimate user's identity, we use the Localised Binary Pattern method in conjunction with the Gabor Wavelet on the locality preserving projection model. Both the legitimacy on the peer-to-peer network and the encryption of data communicated across the network channel are supported by the face structure that has been extracted. As a result, this forms a very strong component for the authentication and encryption of sent communications. Key Words: peer-to-peer, system, encryption, authentication, breach, transmitted