data integrity - security component, JAVA Programming

Assignment Help:

 

Data integrity helps to make sure if something is communicate and not tampered with in the mean while when transmission take place.

Checksums: Simply inserts the bytes within a request message or a file. If the checksums match the integrity is obtained. The weakness with the simplest form of checksum is that some times garbage can be added to create sums equal like

ABCDE == EDCBA

There are more enhanced checksums like CRC-32, Adler-32, which are designed to address the above weakness by considering not only the number of each byte but also its position.

Cryptography hashes: This uses a mathematical function to make a small result called message digest from the input message. Difficult to make false positives. Common hash methods are MD5, SHA etc.

 


Related Discussions:- data integrity - security component

Explain any five buzz words in java, Question 1 Explain any five buzz w...

Question 1 Explain any five buzz words in Java 2 Explain exception classes and also explain common exceptions in java 3 Explain primitive and abstract data type in java

What are the basic components of jsp?, There are two different types of dat...

There are two different types of data in a JSP page. 1. Static part which occurs copied directly to the response by the JSP Engine. 2. Dynamic part, which have anything that

Arrays, Write an application that uses an Array to store 10messages of type...

Write an application that uses an Array to store 10messages of type String. You will store this Array with 10 messages of your choosing. For example, a message could be “I love Jav

Program to brute force search, Ask questionWrite a program BruteForceSearch...

Ask questionWrite a program BruteForceSearch that uses the brute-force approach given above and compare its running time on your computer with that of Binary Search for largeW.txt

Taking in command line arguments, Taking in Command Line Arguments In J...

Taking in Command Line Arguments In Java, the program can be written to accept command-line-arguments. Example Code:  command-line arguments /*  This

Java program to play minesweeper , Project Requirements Write and tes...

Project Requirements Write and test a Java program to play Minesweeper using Model-View-Presenter design (The model is an interface defining the data to be displayed or other

What is includeaction, The IncludeAction class is useful when you require t...

The IncludeAction class is useful when you require to integrate Struts into an application that uses Servlets. Use the IncludeAction class to contain another resource in the respon

How can we include images in a web page using html and java, How can we inc...

How can we include images in a web page using HTML and Java script? Image in HTML Image in Javascript Images in JavaScript could be manipulated in several ways using the buil

Game, any example of games that is created by java ?

any example of games that is created by java ?

Explain traversing through a collector using iterator, Explain traversing t...

Explain traversing through a collector using Iterator. Ans. We can access each element in Collection by using Iterators regardless of how they are organized in collector. Ite

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd