20165210 Java Fifth Experiment Report

Source: Internet
Author: User

20165210 Experimental Five network programming and security network programming and security one: experimental requirements:

Two pairs of pair programming:

    1. Reference Http://www.cnblogs.com/rocedu/p/6766748.html#SECDSA
    2. The function Mybc.java of the expression of infix expression to suffix in the pair realization
    3. The knot pair implements the function of evaluating the suffix expression in an expression obtained from the above function, calling Mydc.java
    4. Upload test code run results and code cloud Links

      Experiment:
Network programming and Security II: Experimental Requirements:

Pair programming: 1 people responsible for the client, one person responsible for the server

    1. Pay attention to the end of the responsibility, will pass the test to prove that no problem
    2. Java socket-based client/server function, transmission mode with TCP
    3. The client lets the user enter infix expression, then converts the function of the infix expression call Mybc.java to the suffix expression, and sends the suffix expression over the network to the server.
    4. The server receives the suffix expression, calls the function of the Mydc.java to compute the value of the suffix expression, and sends the result to the client
    5. The client displays the results sent by the server.
    6. Upload test results and code cloud Links

      Experiment:

Network Programming and Security III: Experimental requirements:

Cryptographic pairing Programming: 1 People responsible for the client, one person responsible for the server

    1. Pay attention to the end of the responsibility, will pass the test to prove that no problem
    2. Java socket-based client/server function, transmission mode with TCP
    3. The client lets the user enter infix expression, then converts the function of the infix expression call Mybc.java to the suffix expression, encrypts the suffix expression with 3DES or AES algorithm and sends the ciphertext to the server via the network.
    4. After the server receives the suffix expression expression, decrypts (and the client negotiates the key, which can be saved in an array), and then calls the function of the Mydc.java to compute the value of the suffix expression and sends the result to the client
    5. The client displays the results sent by the server.
    6. Upload test results and code cloud Links

      Experimental programming:
Network programming and Security four: experimental requirements:

Key Distribution pairing Programming: 1 People responsible for the client, one person responsible for the server

    1. Pay attention to the end of the responsibility, will pass the test to prove that no problem
    2. Java socket-based client/server function, transmission mode with TCP
    3. The client lets the user enter infix expression, then converts the function of the infix expression call Mybc.java to the suffix expression, and uses the suffix expression to encrypt the ciphertext to the server through the network using 3DES or AES algorithm.
    4. Client and server use DH algorithm for key exchange of 3DES or AES algorithm
    5. After the server receives the suffix expression expression, decrypts, and then calls the function of Mydc.java to calculate the value of the suffix expression and sends the result to the client
    6. The client displays the results sent by the server.
    7. Upload test results and code cloud Links

      Experiment:
Network programming and Security Five: experimental requirements:

Integrity Check pair Programming: 1 people responsible for the client, one person responsible for the server

    1. Pay attention to the end of the responsibility, will pass the test to prove that no problem
    2. Java socket-based client/server function, transmission mode with TCP
    3. The client lets the user enter infix expression, and then converts the function of the infix expression call Mybc.java to the suffix expression, and the suffix expression is encrypted with 3DES or AES algorithm to send the MD5 of ciphertext and plaintext to the server by the network.
    4. Client and server use DH algorithm for key exchange of 3DES or AES algorithm
    5. After the server receives the suffix expression expression, decrypts, decrypts the MD5 value of the plaintext, compares it to the MD5 from the client, and then calls the Mydc.java function to compute the value of the suffix expression and sends the result to the client
    6. The client displays the results sent by the server.
    7. Upload test results and code cloud Links

      Experiment:
Experiment Experience:

This experiment can be said to be quite difficult, but fortunately is a companion study, so to thank my little friend 20165214 classmates, in his help can be made.

20165210 Java Fifth Experiment Report

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.