Hello, dear friend, you can consult us at any time if you have any questions, add WeChat: THEend8_
Programming Project
1. Crypto Techniques
The objective of this exercise is to use Java features to write some security mechanisms
that can be used in applications. You will be using the classes from Java Cryptographic
Extension to implement them.
You will need to consult Java API documentation.
Java books that you can reference
Inside Java 2 Platform Security, 2nd Edition, L. Gong, G. Ellision, M. Dageforde
Java Security, Scott Oaks, O’Reilly
For each part of the assignment, skeleton Java code has been provided. These skeletons
will NOT compile. You will need to make modifications on them before they can be
successfully compiled and run.
A) Authentication (15 points)
For the first part of the assignment, you should use the skeleton Java code to implement
double-strength password login using message digest. The following diagram illustrates
the double strength password.
Note that you need to generate 2 rand
om numbers and 2 timestamps. There are three classes defined:
Protection, which provides three functions makeBytes, makeDigest (version 1),
and makeDigest (version 2).
o makeBytes takes in a long integer and a double, then converts them into a
single byte array. makeBytes has already been implemented for you.
o makeDigest (version 1) takes in a byte array, a timestamp, and a random
number, then generates a digest using SHA. This function has already
been implemented for you.