Execute the given code - Encrypted Communication

Assignment Help JAVA Programming
Reference no: EM132265360

Execute the code: Encrypted Communication

The goal of this assignment is to give you practical experience in using cryptographic libraries to implement encryption functionality in your code, especially in regard to data in transit i.e. network communications.

To this end you are provided with two pieces of code (Server.java and Client.java) written in the Java programming language. The code implements a simple socket communication program that enables two machines (a client and a server) to make a connection to each other and send messages.

Your objective in carrying out this assignment will be to modify the code to achieve the following:
• Unlimited communication between the client and the server
• Termination of the connection when a specific message is sent from the client to the server
• Encryption of the communication between the client and the server using any encryption technique

Instructions

1. You will find attached the two pieces of Java programming language code that implement the socket program (One for the client side and the other for the server side).

2. You can run the program on any platform that works for you (I would suggest using Ubuntu Linux). After compiling the code, you have to assign a port number (example; Port number = 5000, you can use any port number between 2000 and 65535) to the server when putting in the command to run it. i.e. java Server 5000

On the client side, you need the host name or IP address of the machine on which the server is running (if the host name or IP address is X) to run the client and connect to the server java client X 5000

If you are running both programs on the same machine, the host name of the server will be localhost java client localhost 5000

NOTE: A tutorial will be given to explain the details of the program and demonstrate how to compile and run the code. Please endeavor to attend the tutorial

3. The connection between the client and server closes after one message is sent, modify the codes such that multiple messages can be sent between both sides without termination.

4. Modify the code to terminate the connection when the client sends the message "End Session" to the server.

5. Modify the code such that communication between both the client and server is encrypted

6. During the communication the terminal should display the messages received both before decryption and after decryption

NOTE: Implement any encryption technique you've learnt so far and use any Java language cryptographic library of your choice, preferably the one you identified in your previous assignment.

Attachment:- Code.rar

Verified Expert

The solution file is prepared in netbeans which has two files are server.java and client.java. This program implemented server client messaging system using encrypted technique. Client and server can establish connection using server port number and send messages between them. Client's message can send to server which encrypted and server can decrypted the client's message and reply to client in encrypted message. The report file has program with output screen shot.

Reference no: EM132265360

Questions Cloud

Explain what a macro command is and provide an example : There are assemblers that are capable of handling macro commands. Part 1: Explain what a macro command is and provide an example
Context free grammar and a monotone grammar : What is the difference between a context free grammar and a monotone grammar?
What is the dns address that is used : What is the DNS address that is used to bring you to these two websites? Provide the evidence from Wireshark. If there are multiple addresses, show all of them.
Explain what the lessons are : Explain what the lessons are, then explain how (and why) they will help you improve your life and career.
Execute the given code - Encrypted Communication : Execute the given code - implement encryption functionality in your code, especially in regard to data in transit i.e. network communications
Identify dependent and independent variable : Identify dependent and independent variable and write statement from below (variable A and variable B. )
How you would address the opponent to your position : Describe how you would address the opponent to your position. Be specific and provide examples. Recommend at least one amendment to the bill in support.
Concerned about the exact width of their cyclocross tires : Consider again the company making tires for bikes is concerned about the exact width of their cyclocross tires.
Political structures and the international community : Identify and discuss the ways in which federalism, political structures, and the international community,

Reviews

len2265360

3/25/2019 12:41:19 AM

Implement any encryption technique you've learnt so far and use any Java language cryptographic library of your choice, preferably the one you identified in your previous assignment. Submission 1) Submit your modified code and a report (which should include screenshots of your results for questions 3, 4, and 5) in separate files via Blackboard by the due date. No zipped files allowed.

Write a Review

JAVA Programming Questions & Answers

  Mining information from sales data is a common task in both

mining information from sales data is a common task in both traditional and online stores. past sales information can

  Create a new function randomadd

Create a new function randomAdd(), which adds nodes in random places in the tree, and use that function instead.

  Implement an object oriented system

Develop the practical ability to describe, justify, and implement an object oriented system and - Understand the techniques of Object Oriented design and develop hands-on programming skill in developing java applications

  Create wheel 360 degree

You have to create wheel, 360 degree. That is numbered 0-36. it is supposed to be spun, and randomly lands on one of the numbers.

  Implement the hashcode method

Java, every object has an equals and a hashCode method that is used, among other things, by the standard Collections library. By default both are based on an object's memory location

  Demonstrate use of the tools and techniques in ape

This assignment is designed to allow you to demonstrate use of the tools and techniques that we covered in the APE course. You are presented with a situation in which you can apply the practices from the course

  Implement a shopping cart class with user interface

project will be to implement a shopping cart class with user interface (UI) that contains main() in Net Beans. The UI class will be used to perform user input/output and to invoke the appropriate methods of shopping cart class. When your program star..

  Implement the enhancements to your survey class

Implement the enhancements to your Survey class according to the requirements presented above. The Survey class should have a method called "topRatedQuestion()," which performs an analysis of all responses for each question.

  Swing gui program to make the applet

Each button under Yes or No, when clicked, would respond with a corresponding statement printed in the South border to say

  Insert in order functionality to your statistics program

You are to add mean, standard deviation, and insert in order functionality to your statistics list program.

  Working for hypothetical insurance company

Assume that you are working for hypothetical insurance company. This company offers insurance for 4 types of vehicles: cars, trucks, motor cycles and boats. In order to keep the program manageable, we will assume that we do not make a finer distin..

  Compute the daily wage of an employee

Write a JAVA program that will input Employee Name, Rate per hour, No. of hours worked and will compute the daily wage of an employee. If the number of hours worked exceeds eight hours add 30% to each excess hours as overtime rate.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd