I gang

Java, Java security

1) Code to input a password from the screen and create a key with an additional salt. [5 marks in total] Some marks will be given for alternatively automatically creating a key without a salt. [4 marks in total] (You may also need to set the number of iterations in the key creation.)

2) Code to encrypt an arbitrary length string (the message) with a cipher. [5 marks]

3) Code to break an arbitrary string into eight-byte blocks and pad those blocks if the string is not an exact multiple of eight. [5 marks in total] You are asked to write your own code for this task and to output the blocks to the screen. Extra credit will be given for using the PKCS #5 scheme in your code (without using pre-written library code). [8 marks in total]

4) Code to encrypt in CBC mode with an IV. If you have not accomplished part 3) then an array of eight-byte values can be used for this part. [7 marks]

5) Code to create a secure digest of the original message. [5 marks]

6) Code to write the ciphertext, the IV, and the digest into a file and code to read the ciphertext and the other items from that file into the device. [10 marks in total] Extra marks are available if Java sockets or some other networked communication such as Java RMI is used to communicate the ciphertext and the other items. [15 marks in total]

7) Code to decipher the CBC message and test code to display the resulting message on the screen. [10 marks]

8) Simple Graphical User Interface (GUI) to be used for input of the password and the user commands. There is NO requirement to implement the processing of commands at the device end. [5 marks in total]

9) A report written in MS Word containing screen output for each of the tasks, with a commentary on your solution to each of the tasks that you have accomplished. You are also asked to explain the need for: key creation iterations; a salt; PK #5 padding; CBC mode; and an IV. [35 marks]

10) The report should conclude by suggesting improvements to the basic implementation. [5 marks]

Evner: Java, Software Arkitektur

Se mere: string processing in c, string library in c, string library c, library part, java 1.5 for each, interface security, creation architecture, word pre, Salt, RMI, password break, java security, java rmi, java java java, java communication, encrypt, Decipher, Commentary, code security, cipher, byte, Basic java, file byte array, read file gui java, java simple array

Om arbejdsgiveren:
( 0 bedømmelser ) london, United Kingdom

Projekt ID: #950889

Tildelt til:


Hi, please check my PM. Cheers!

$300 USD in 5 dage
(4 bedømmelser)

8 freelancere byder i gennemsnit $491 på dette job


Hello Sir, We have 6+ years of experience in JAVA. Also we have worked on network protocols and encryption in JAVA. Please check INBOX!

$750 USD in 7 dage
(303 bedømmelser)

Hello, Please check your inbox Thanks

$480 USD in 5 dage
(68 bedømmelser)

Hello, Please view PMB. Ashwin

$700 USD in 5 dage
(40 bedømmelser)

Dear sir, I am proficient in java programming especially in algorithm implementation and network security and cryptography. My graduate study focus on network security and cryptography and I have implemented many en Flere

$300 USD in 3 dage
(27 bedømmelser)

Java developer team based in the UK. We can take care of the coding in a matter of hours, but please describe the report format required in more detail.

$300 USD in 3 dage
(1 bedømmelse)

See your message box.

$500 USD in 7 dage
(1 bedømmelse)

I am acquainted with all available requirements of the project. I have been in the security field for long time. I believe I can help you with this.

$600 USD in 6 dage
(0 bedømmelser)