data integrity - security component, JAVA Programming

Assignment Help:

 

Data integrity helps to make sure if something is communicate and not tampered with in the mean while when transmission take place.

Checksums: Simply inserts the bytes within a request message or a file. If the checksums match the integrity is obtained. The weakness with the simplest form of checksum is that some times garbage can be added to create sums equal like

ABCDE == EDCBA

There are more enhanced checksums like CRC-32, Adler-32, which are designed to address the above weakness by considering not only the number of each byte but also its position.

Cryptography hashes: This uses a mathematical function to make a small result called message digest from the input message. Difficult to make false positives. Common hash methods are MD5, SHA etc.

 


Related Discussions:- data integrity - security component

Design a scheduler in java, Your task is to design a scheduler for the Sher...

Your task is to design a scheduler for the Sheridan Rail Corporation which keeps track of all daily scheduled trips for the railway.  Users can add new trips as well as perform sea

Mobile pop-under script for mobile browsers, Project Description: Give a...

Project Description: Give a script that will produce a pop-under on a mobile landing page -We can host our own landing page and we will want to change the destination URL for

Railway reservation, what java stream is used for designing railway reserva...

what java stream is used for designing railway reservation form?

Android app implemented on a website, iPhone /Android app implemented on a ...

iPhone /Android app implemented on a website Project Description: I need someone to implement an iPhone/Android app onto a website page, So users can be able to use the Ap

What is jms provider, An execution of the JMS interface for a Message Orien...

An execution of the JMS interface for a Message Oriented Middleware (MOM). Providers are executed as either a Java JMS execution or an adapter to a non-Java MOM.

What are not allowed within the ejb container? , In  order  to  provide  po...

In  order  to  provide  portable  and  reliable  EJB  elements,  the  following  restrictions  apply  to  EJB  code implementation: 1. Avoid using static non-final fields. Defin

Probability, Mike sells on the average 15 newspapers per week (Monday – Fri...

Mike sells on the average 15 newspapers per week (Monday – Friday). Find the probability that 2.1 In a given week he will sell all the newspapers [7] 2.2 In a given day he will se

What is the comparable interface, What is the Comparable interface? Com...

What is the Comparable interface? Comparable interface is used to sort arrays and collections of objects using collections.sort() and java.utils. Objects of the class implement

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd