Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Directions A business you are working with has a public key that they are hoping to distribute to clients. Their clients want to download the

Directions
A business you are working with has a public key that they are hoping to distribute to clients. Their clients want to download the public key
from a website and verify the key with a checksum. To accomplish this, you will need to code a simple string checksum verification program. In
addition, you will need to document your process by completing the Module Five Coding Assignment Checksum Verification Template, linked
in What to Submit.
Specifically, you must address the following rubric criteria:
Algorithm Cipher: Recommend an appropriate encryption algorithm cipher that avoids collisions.
a. To do so, review the scenario and the Java Security Standard Algorithm Names, which is a standard list of algorithm ciphers provided by
Oracle.
b. Document your recommendation in the template provided.
Justification: Justify your reasoning for the recommended algorithm cipher that avoids collisions.
a. To do so, provide a brief, high-level overview of the encryption algorithm software. Consider what it means to avoid collisions. Why is
this important?
b. Document your reasoning in the template provided.
Generate Checksum: Refactor the code to encrypt a text string and generate a checksum verification.
a. To do so, first download the Module Five Coding Assignment Checksum Verification Code Base, linked in the Supporting Materials
section, and upload it to Eclipse as a new project. Refactor the code to add your first and last name as a unique data string. You will
submit your refactored code for your instructor to review. Then generate the checksum by following these steps:
i. Create an object of MessageDigest class using the java.security.MessageDigest library.
ii. Initialize the object with your selection for an appropriate algorithm cipher.
iii. Use the digest() method of the class to generate a hash value of byte type from the unique data string (your first and last name).
iv. Convert the hash value to hex using the bytesToHex function.
v. Create a RESTFul route using the @RequestMapping method to generate and return the required information to the web browser,
including the hash value.
Verification: Demonstrate that a hash value has been created for the unique text string (your first and last name) by executing the Java
code.
a. Then use your web browser to connect to the RESTful API server. It should show your first and last name as the unique data string in
the browser, the name of the algorithm cipher you used, and the checksum hash value.
b. Capture a screenshot of the web browser with your unique information and add it to the template provided. An example of the
expected output is shown below:package com.snhu.sslserver;
GIVEN CODE:
import org.springframework.boot.SpringApplication; .
aSpringBootApplication
public class ServerApplication {
public static void main(String[] args){
SpringApplication. run (ServerApplication.class, args);
}
}
@RestController
class ServerController
//FIXVE: Add hash function to return the checksum value for the data string that should
//contain your name.
@RequestMapping ("/hash")
public String myHash(){
String data = "Hello Joe Smith!";
return "data:"+data;
}
}
Given POM.xml:
4.0.0
org.springframework.boot
spring-boot-starter-parent
2.2.4.RELEASE
com.snhu
ssl-server
0.0.1-SNAPSHOT
ssl-server
ssl-server skeleton for CS-305
1.8
org.springframework.boot
spring-boot-starter-data-rest
org.springframework.boot
spring-boot-starter-web
org.springframework.boot
spring-boot-starter-test
test
org.junit.vintage
junit-vintage-engine
org.springframework.boot
spring-boot-maven-plugin
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Systems For Advanced Applications 15th International Conference Dasfaa 2010 International Workshops Gdm Benchmarx Mcis Snsmw Diew Udm Tsukuba Japan April 2010 Revised Selected Papers Lncs 6193

Authors: Masatoshi Yoshikawa ,Xiaofeng Meng ,Takayuki Yumoto ,Qiang Ma ,Lifeng Sun ,Chiemi Watanabe

2010th Edition

3642145884, 978-3642145889

More Books

Students also viewed these Databases questions