Answered step by step
Verified Expert Solution
Question
1 Approved Answer
I need ehlp with this, no matter the code or what I do all I get in the local host area is joe smith, I
I need ehlp with this, no matter the code or what I do all I get in the local host area is joe smith, I cannot get the verification or my name to appear A business you are working with has a public key that it hopes to distribute to clients. The business clients want to download the public key from a website and verify the key with a checksum. To accomplish this, you will code a simple string checksum verification program. You will also document your process by completing the Module Five Coding Assignment Checksum Verification Template linked in the What to Submit section. Review the modules Resources section to help you with this assignment. Specifically, you must address the following rubric criteria: Algorithm Cipher: Recommend an appropriate encryption algorithm cipher that avoids collisions. Review the scenario and the Java Security Standard Algorithm Names resource linked in the Supporting Materials section. The Java Security Standard Algorithm Names is a standard list of algorithm ciphers provided by Oracle. Document your recommendation in the template provided. Justification: Justify your reasoning for the recommended algorithm cipher that avoids collisions. Provide a brief, highlevel overview of the encryption algorithm software. Consider what avoiding collisions means. Why is avoiding collisions important? Document your reasoning in the template provided. Generate Checksum: Refactor the code to encrypt a text string and generate a checksum verification. Download the Module Five Coding Assignment Checksum Verification Code Base, linked in the Supporting Materials section, and upload it to Eclipse as a new project. Refactor the code to add your first name and last name as a unique data string. You will submit your refactored code for your instructor to review. Then generate the checksum by following these steps: Create an object of MessageDigest class using the java.security.MessageDigest library. Initialize the object with your selection for an appropriate algorithm cipher. Use the digest method of the class to generate a hash value of byte type from the unique data string that includes your first name and last name. Convert the hash value to hex using the bytesToHex function. Create a RESTFul route using the @RequestMapping method to generate and return the required information, including the hash value, to the secure web browser. Verification: Demonstrate that a hash value has been created for the unique text string that includes your first name and last name by executing the Java code. Then use your web browser to connect to the RESTful API server. This action should show your first name and last name as the unique data string in the browser, the name of the algorithm cipher you used, and the checksum hash value. Capture a screenshot of the secure web browser with your unique information and add it to the template provided. An example of the expected output is shown below. This is the given code package com.snhu.sslserver; import org.springframework.boot.SpringApplication; import org.springframework.boot.autoconfigure.SpringBootApplication; import org.springframework.web.bind.annotation.RequestMapping; import org.springframework.web.bind.annotation.RestController; @SpringBootApplication public class ServerApplication public static void mainString args SpringApplication.runServerApplicationclass, args; @RestController class ServerController FIXME: Add hash function to return the checksum value for the data string that should contain your name. @RequestMappinghash public String myHash String data "Hello Joe Smith!"; return "data:"data;
I need ehlp with this, no matter the code or what I do all I get in the local host area is joe smith, I cannot get the verification or my name to appear
A business you are working with has a public key that it hopes to distribute to clients. The business clients want to download the public key from a website and verify the key with a checksum. To accomplish this, you will code a simple string checksum verification program. You will also document your process by completing the Module Five Coding Assignment Checksum Verification Template linked in the What to Submit section. Review the modules Resources section to help you with this assignment.
Specifically, you must address the following rubric criteria:
Algorithm Cipher: Recommend an appropriate encryption algorithm cipher that avoids collisions.
Review the scenario and the Java Security Standard Algorithm Names resource linked in the Supporting Materials section. The Java Security Standard Algorithm Names is a standard list of algorithm ciphers provided by Oracle.
Document your recommendation in the template provided.
Justification: Justify your reasoning for the recommended algorithm cipher that avoids collisions.
Provide a brief, highlevel overview of the encryption algorithm software. Consider what avoiding collisions means. Why is avoiding collisions important?
Document your reasoning in the template provided.
Generate Checksum: Refactor the code to encrypt a text string and generate a checksum verification.
Download the Module Five Coding Assignment Checksum Verification Code Base, linked in the Supporting Materials section, and upload it to Eclipse as a new project. Refactor the code to add your first name and last name as a unique data string. You will submit your refactored code for your instructor to review. Then generate the checksum by following these steps:
Create an object of MessageDigest class using the java.security.MessageDigest library.
Initialize the object with your selection for an appropriate algorithm cipher.
Use the digest method of the class to generate a hash value of byte type from the unique data string that includes your first name and last name.
Convert the hash value to hex using the bytesToHex function.
Create a RESTFul route using the @RequestMapping method to generate and return the required information, including the hash value, to the secure web browser.
Verification: Demonstrate that a hash value has been created for the unique text string that includes your first name and last name by executing the Java code.
Then use your web browser to connect to the RESTful API server. This action should show your first name and last name as the unique data string in the browser, the name of the algorithm cipher you used, and the checksum hash value.
Capture a screenshot of the secure web browser with your unique information and add it to the template provided. An example of the expected output is shown below.
This is the given code
package com.snhu.sslserver;
import org.springframework.boot.SpringApplication;
import org.springframework.boot.autoconfigure.SpringBootApplication;
import org.springframework.web.bind.annotation.RequestMapping;
import org.springframework.web.bind.annotation.RestController;
@SpringBootApplication
public class ServerApplication
public static void mainString args
SpringApplication.runServerApplicationclass, args;
@RestController
class ServerController
FIXME: Add hash function to return the checksum value for the data string that should contain your name.
@RequestMappinghash
public String myHash
String data "Hello Joe Smith!";
return "data:"data;
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access with AI-Powered Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started