data integrity - security component, JAVA Programming

 

Data integrity helps to make sure if something is communicate and not tampered with in the mean while when transmission take place.

Checksums: Simply inserts the bytes within a request message or a file. If the checksums match the integrity is obtained. The weakness with the simplest form of checksum is that some times garbage can be added to create sums equal like

ABCDE == EDCBA

There are more enhanced checksums like CRC-32, Adler-32, which are designed to address the above weakness by considering not only the number of each byte but also its position.

Cryptography hashes: This uses a mathematical function to make a small result called message digest from the input message. Difficult to make false positives. Common hash methods are MD5, SHA etc.

 

Posted Date: 7/27/2012 6:03:47 AM | Location : United States







Related Discussions:- data integrity - security component, Assignment Help, Ask Question on data integrity - security component, Get Answer, Expert's Help, data integrity - security component Discussions

Write discussion on data integrity - security component
Your posts are moderated
Related Questions
Difference between URL instance and URL Connection instance? Ans) A URL instance shows the location of a resource, and a URL Connection instance shows a link for accessing or co

Give a example of Using toString() Methods ? Below is a version of CarTest in which uses toString() and System.out.println() instead of printing the fields in a straight line

What is difference among LookupDispatchAction and DispatchAction? Ans) The difference among LookupDispatchAction and DispatchAction is that the actual method that gets known in

Explain about Drawing Lines? Drawing straight lines along with Java is easy. Just call g.drawLine(x1, y1, x2, y2) where (x1, y1) and (x2, y2) are the endpoints of your lines

Normal 0 false false false EN-US X-NONE X-NONE      Obj ec t Ori e n

A joinpoint is a point in the implementation of the application where an aspect can be plugged in. This point could be a method being called, an exception being thrown, or even a f

Java has some bugs in its applets. Java team stated that they have zero tolerance over security features and subsequent editions of Java are managing Bug free environment. Some of

how to give dataset to a decision tree which is written by java using weka software?

Given the following XHTML page:   Create an embedded JavaScript function named getUserInfo that prompts the user with the following two questions after the XHTML page has loa

How to Implementing the Cloneable Interface The java.lang.Object class contains a clone() method which returns a bitwise copy of the current object. protected native Object cl