data integrity - security component, JAVA Programming

Assignment Help:

 

Data integrity helps to make sure if something is communicate and not tampered with in the mean while when transmission take place.

Checksums: Simply inserts the bytes within a request message or a file. If the checksums match the integrity is obtained. The weakness with the simplest form of checksum is that some times garbage can be added to create sums equal like

ABCDE == EDCBA

There are more enhanced checksums like CRC-32, Adler-32, which are designed to address the above weakness by considering not only the number of each byte but also its position.

Cryptography hashes: This uses a mathematical function to make a small result called message digest from the input message. Difficult to make false positives. Common hash methods are MD5, SHA etc.

 


Related Discussions:- data integrity - security component

How can you describe a consistent web design, How can you describe a consis...

How can you describe a consistent web design? Why is it required? A consistent web design is Easy understandable, not along with heavy graphics, easy navigation. It is required

Create a program using constructors, Create a program Using Constructors? ...

Create a program Using Constructors? The further program uses the constructor to initialize a car rather than setting the areas directly. class CarTest7 { public static voi

What is struts validator framework, Struts Framework gives the functionalit...

Struts Framework gives the functionality to validate the form data. It can be use to authenticate the data on the users browser as well as on the server side. Struts Framework emit

Difference between the file and randomaccessfile classes, The File class en...

The File class encapsulates the files and directories of the local file system. The RandomAccessFile class gives the methods required to directly access data contained in any part

Want an experienced ios and android expert, Want an Experienced iOS and And...

Want an Experienced iOS and Android expert Project Description: I am seeking a super talented team or Individual for a Real Estate app. The project wants to get done in a ver

What are the steps of working of tcp and ip protocols, What are the steps o...

What are the steps of working of TCP and IP protocols within internet transmission? TCP divide messages in several packets (capsulation) and sent these messages over the internet

Interfaces and generics, In this assignment, you are provided with an inter...

In this assignment, you are provided with an interface that contains a generic type. You are asked to create two classes that implement this interface. A. The Sequenced Interfac

Explain the three benefits of access protection, Explain the Three Benefits...

Explain the Three Benefits of Access Protection ? Access protection has three major benefits: 1. It permits you to enforce constraints on an object's state. 2. It gives a si

What is jdbc exactly, What is JDBC exactly? Describe the steps required to ...

What is JDBC exactly? Describe the steps required to execute a SQL query using JDBC.

Difference between a scrollbar and a scrollpanel in jsp, A Scrollbar is a C...

A Scrollbar is a Component while Scroll Panel is a Container. A Scroll Panel handles its own events and performs its own scrolling.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd