data integrity - security component, JAVA Programming

 

Data integrity helps to make sure if something is communicate and not tampered with in the mean while when transmission take place.

Checksums: Simply inserts the bytes within a request message or a file. If the checksums match the integrity is obtained. The weakness with the simplest form of checksum is that some times garbage can be added to create sums equal like

ABCDE == EDCBA

There are more enhanced checksums like CRC-32, Adler-32, which are designed to address the above weakness by considering not only the number of each byte but also its position.

Cryptography hashes: This uses a mathematical function to make a small result called message digest from the input message. Difficult to make false positives. Common hash methods are MD5, SHA etc.

 

Posted Date: 7/27/2012 6:03:47 AM | Location : United States







Related Discussions:- data integrity - security component, Assignment Help, Ask Question on data integrity - security component, Get Answer, Expert's Help, data integrity - security component Discussions

Write discussion on data integrity - security component
Your posts are moderated
Related Questions
Project Description: Computer vision and Image processing project to extract book title Skills required: Java, C Programming

i have got project of Vending machine. would you please help me about how to start and how to use coding.thanks

Question: a) Change the following example, using the Java's conditional operator expression, to solve the duplication problem. public class Demonstrate { public static voi

The event handler attribute consists of three elements. Write about each of them? 1. The identifier of the event handler. 2. The equal sign. 3. A string consisting of JavaScrip

What is JDBC exactly? Describe the steps required to execute a SQL query using JDBC.

The Application context module makes spring a framework. This module extends the concept of BeanFactory, giving support for internationalization (I18N) messages, application lifecy

Write a program that takes as input a sequence of transactions of the form "buy x; share(s) at $y each" or "sell x share(s) at $y each," assuming that the transactions occur on con

Operator Functionality E x ample/Explanation = Sets one value equal to another counter=0  Sets the counter to equivale

Defines to keeping all the related members together in an object. Specifying member variables as private may hide the methods and variables. Objects should hide their inner working

What happens to the static fields of a class during serialization? There are three exceptions in which serialization does not necessarily read and write to the stream. These