Overview The cryptographic hash function has great utility for sharing information. In a commercial environment where the organization needs to distribute programs or documentation to customers, the...

1 answer below »

Overview


The cryptographic hash function has great utility for sharing information. In a commercial environment where the organization needs to distribute programs or documentation to customers, the organization can use the hash value to ensure the customer receives unaltered information. The common term for producing a hash value for a data file is a checksum. Producing a checksum for files that customers will download allows your customers to check for transmission errors and prevents an attacker from disguising a malicious file as your original file.


Two people working on a computer

To do this, you will need to produce a cryptographic hash function that is not susceptible to collisions. For example, certain older algorithm ciphers have been found to be "hackable"; that is, a hacker can produce a checksum for a malicious version of a file that equates to the same checksum as the original file. In this assignment, you will need to research options to find and produce a cryptographic hash function that will not be susceptible to collisions.


Specifically, you will deploy an appropriate algorithm cipher to encrypt and produce a checksum verification in order to increase the layers of security for a software application.


Prompt


A business you are working with has a public key that they are hoping to distribute to clients. Their clients want to download the public key from a website and verify the key with a checksum. To accomplish this, you will need to code a simple string checksum verification program. In addition, you will need to document your process by completing
the provided template.



Algorithm Cipher: Review the scenario and the
Java Security Standard Algorithm Names, which is a standard list of algorithm ciphers provided by Oracle.
Recommend an appropriate encryption algorithm cipher that avoids collisions. Document your recommendation in the template provided.



Justification: Justify your reasoning for the recommended algorithm cipher
by providing a brief, high-level overview of the encryption algorithm cipher. Consider what it means to avoid collisions. Why is this important? Document your recommendation in the template provided.



Generate Checksum: Refactor the code to encrypt a text string and generate a checksum verification. First,
download the code baseand upload it to Eclipse as a new project. Refactor the code to add your first and last name as a unique data string. You will submit your refactored code for your instructor to review. Then generate the checksum by following these steps:



  1. Create an object of MessageDigest class using the java.security.MessageDigest library.

  2. Initialize the object with your selection for an appropriate algorithm cipher.

  3. Use the digest() method of the class to generate a hash value of byte type from the unique data string (your first and last name).

  4. Convert the hash value to hex using the bytesToHex function.

  5. Create a RESTFul route using the @RequestMapping method to generate and return the required information, which includes the hash value, to the web browser.



Verification: Demonstrate that a hash value has been created for the unique text string (your first and last name) by executing the Java code. Then use your web browser to connect to the RESTful API server. This should show your first and last name as the unique data string in the browser, the name of the algorithm cipher you used, and the checksum hash value. Capture a screenshot of the web browser with your unique information and add it to the template provided. An example of the expected output is shown below:


Checksum verification with data fields
Answered 17 days AfterJul 23, 2022

Answer To: Overview The cryptographic hash function has great utility for sharing information. In a commercial...

Aditi answered on Jul 28 2022
87 Votes
CS 305 Module Five Checksum Verification Assignment
Instructions: Replace the bracketed text with y
our answers in your own words.
Algorithm Cipher
Recommend an appropriate encryption algorithm cipher that avoids collisions.
The SHA256 method has a low probability of collision, thus I'm going to suggest it.
Justification
Justify your reasoning for the recommended algorithm cipher by providing a brief, high-level overview of the encryption algorithm cipher.
To...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here