Implement encryption functionality in your code

Assignment Help JAVA Programming
Reference no: EM132274542

Assignment: Background: The goal of this assignment is to give you practical experience in using cryptographic libraries to implement encryption functionality in your code, especially in regard to data in transit i.e. network communications.

To this end you are provided with two pieces of code (Server.java and Client.java) written in the Java programming language. The code implements a simple socket communication program that enables two machines (a client and a server) to make a connection to each other and send messages.

Your objective in carrying out this assignment will be to modify the code to achieve the following:

• Unlimited communication between the client and the server

• Termination of the connection when a specific message is sent from the client to the server

• Encryption of the communication between the client and the server using any encryption technique

Instructions: 1. You will find attached the two pieces of Java programming language code that implement the socket program (One for the client side and the other for the server side).

2. You can run the program on any platform that works for you (I would suggest using Ubuntu Linux). After compiling the code, you have to assign a port number (example; Port number = 5000, you can use any port number between 2000 and 65535) to the server when putting in the command to run it. i.e.

java Server 5000

On the client side, you need the host name or IP address of the machine on which the server is running (if the host name or IP address is X) to run the client and connect to the server

java client X 5000

If you are running both programs on the same machine, the host name of the server will be localhost

java client localhost 5000

NOTE: A tutorial will be given to explain the details of the program and demonstrate how to compile and run the code. Please endeavor to attend the tutorial

3. The connection between the client and server closes after one message is sent, modify the codes such that multiple messages can be sent between both sides without termination.

4. Modify the code to terminate the connection when the client sends the message "End Session" to the server.

5. Modify the code such that communication between both the client and server is encrypted

6. During the communication the terminal should display the messages received both before decryption and after decryption

NOTE: Implement any encryption technique you've learnt so far and use any Java language cryptographic library of your choice, preferably the one you identified in your previous assignment.

Information related to above question is enclosed below:

Attachment:- Program.rar

Reference no: EM132274542

Questions Cloud

Would the method you selected meet the purpose of the study : DBST 667 – Data Mining Discuss what page you elected to use for analysis and then what the website optimization report reveals about that web page.
Outline the basics of opening a blank workbook : Outline the basics of opening a blank workbook and using Formulas to work with data in Microsoft Excel.
Describe basic functions and techniques : Describe basic functions and techniques that will be used when creating and editing documents in Microsoft Word.
What do you believe problems of this social structure can be : The wealthiest held the vast majority of the land,while most of the population lived in poverty.What do you believe the problems of this social structure can be
Implement encryption functionality in your code : The goal of this assignment is to give you practical experience in using cryptographic libraries to implement encryption functionality in your code, especially.
Analyze the potential for the successful implementation : Analyze the potential for the successful implementation of Dodd-Frank Act (2010).
Determine who is eligible to participate in a program : Determine who is eligible to participate in a program. If a program is universal in scope, need is the only criterion for eligibility.
Why is voting important to the survival of our democracy : Texas is a one-party dominated state and dominated by the Republican Party. Do you think Republican dominance is best for the people of Texas, why?
What evidence of large-scale voting fraud was : What evidence of large-scale voting fraud was, or is evident in the Texas Electoral System?

Reviews

Write a Review

JAVA Programming Questions & Answers

  Loop structure

Suggest one (1) example of a problematic programming situation or scenario that the use or implementation of a loop structure could resolve. Justify your response

  How many values you had to examine to determine outcome

Look at the middle value of the array; if the value is found, you're done. Otherwise, the value is either greater or less than this value .

  What would the code for a java application look like

What would the code for a java application look like with these requirements - Finally prints on a separate line the two input strings 'in reverse'

  Java program for real estate agent

Write down java program for real estate agent. Program must perform the following tasks: ask users for average house price for the each of past 5 years for single family residence of 1500 square feet.

  What is the minimal total weight of cylinders

A scuba diver uses a special equipment for diving. He has a cylinder with two containers: one with oxygen and the other with nitrogen. Depending on the time he wants to stay under water and the depth of diving the scuba diver needs various amount of ..

  Create a keyboard driven video game

Create a keyboard driven video game, with you the player in the center of the screen. Shapes will enter the screen and you will need to shoot them. If any of the shapes collide with your ship your game will end.

  Part-11 exceptions and exception handlinggt create a java

part-11 exceptions and exception handlinggt create a java class called samearraysexception that extends the exception

  Implementing a relatively simple text-compression scheme

You will be implementing a relatively simple text-compression scheme - It should run from the command line.

  Implement polymorphism and dynamic binding

We are going to implement Polymorphism and dynamic binding by creating generalized methods that accept generalized Employee objects to collect input and display information. However, in the main method we will pass derived objects of the Employee ..

  Write a simple program that uses the class

Write a simple program that uses the class. It should prompt the user to input a string, display it, call one or the other of the class functions to convert it, then display the converted string.

  Identify and use the correct syntax

ITECH1000 - Identify and use the correct syntax of a common programming language and Recall and use typical programming constructs to design and implement simple software solutions

  Create a text file that contains ten person objects

Create a text file that contains ten Person objects where each object is represented on a separate line with each attribute separated by a comma.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd