data integrity - security component, JAVA Programming

 

Data integrity helps to make sure if something is communicate and not tampered with in the mean while when transmission take place.

Checksums: Simply inserts the bytes within a request message or a file. If the checksums match the integrity is obtained. The weakness with the simplest form of checksum is that some times garbage can be added to create sums equal like

ABCDE == EDCBA

There are more enhanced checksums like CRC-32, Adler-32, which are designed to address the above weakness by considering not only the number of each byte but also its position.

Cryptography hashes: This uses a mathematical function to make a small result called message digest from the input message. Difficult to make false positives. Common hash methods are MD5, SHA etc.

 

Posted Date: 7/27/2012 6:03:47 AM | Location : United States







Related Discussions:- data integrity - security component, Assignment Help, Ask Question on data integrity - security component, Get Answer, Expert's Help, data integrity - security component Discussions

Write discussion on data integrity - security component
Your posts are moderated
Related Questions
Individual Assignment Rework Asteroids to have a different gameplay In the previous assignments, we have developed an Asteroids game. In this assignment, we are going to u

Custom Website Technical Specification Document A Solution provider / System Architect to interpret and speak with me and build business functional needs and a set of research d


Need the following code in double var instead of integer. import javax.swing.*; public class arrayVar { public static void main (String[] args) //This is our main method prompt

Develop E-Commerce Website I need an E-Commerce website for my furniture shop which requires to an online store to buy products online. So, Skills required: HTML, Java, Gr

What are Logic- or Time-Bombs ? It execute the payload while predetermined event occurs. For instance use kind's particular phrase and particular data is reached.

Problem statement Part 1 Write an aspect that counts different kinds of method calls in a Java program. Your aspect should meet the following requirements:  The aspect should ma

The "http protocol" is a stateless response or request based protocol. You may contain the state information between different page requests as given below: HTTP Sessions are

Want experienced GLSL programmer for Java project Project Description: I am preparing a small 3d game engine in Java, and I wanted to hire a GLSL programmer to help out with