20145234 Huangfei "Java Programming" experiment five-network security and programming

Source: Internet
Author: User

1:

Two pairs of pair programming: 0. Refer to Http://www.cnblogs.com/rocedu/p/6766748.html#SECDSA 1. The function mybc.java2 of the expression of infix expression to suffix is realized by knot pair. The knot pair implements the function of evaluating the suffix expression in an expression obtained from the above function, calling Mydc.java

2:

Pair programming: 1 people responsible for the client, one for server 0. Pay attention to the end of the responsibility, will pass the test to prove that there is no problem 1. Based on the Java socket implementation of client/server functions, transmission mode with TCP2. The client lets the user enter infix expression, then converts the function of the infix expression call Mybc.java to the suffix expression and sends the suffix expression over the network to server 3. The server receives the suffix expression and calls the Mydc.java function to compute the value of the suffix expression and sends the result to client 4. The client displays the results sent by the server.

3:

Cryptographic pairing Programming: 1 People responsible for the client, one for the server 0. Pay attention to the end of the responsibility, will pass the test to prove that there is no problem 1. Based on the Java socket implementation of client/server functions, transmission mode with TCP2. The client lets the user enter infix expression, then converts the function of the infix expression call Mybc.java to the suffix expression, and the suffix expression is encrypted with the 3DES or AES algorithm and sent to server 3 via the network. After the server receives the suffix expression expression, decrypts (and the client negotiates the key, which can be saved in an array), and then calls the function of Mydc.java to compute the value of the suffix expression and sends the result to client 4. The client displays the results sent by the server.

4:

Key Distribution pair Programming: 1 people responsible for the client, one for server 0. Pay attention to the end of the responsibility, will pass the test to prove that there is no problem 1. Based on the Java socket implementation of client/server functions, transmission mode with TCP2. The client lets the user enter infix expression, and then converts the function of the infix expression call Mybc.java to the suffix expression, and uses the suffix expression to encrypt the ciphertext to server 3 via the network using the 3DES or AES algorithm. The client and server use the DH algorithm for the 3DES or AES algorithm key exchange 4. After the server receives the suffix expression expression, it decrypts and then calls the function of Mydc.java to evaluate the suffix expression and sends the result to client 5. The client displays the results sent by the server.

5:

Integrity Check pair Programming: 1 people responsible for the client, one person responsible for server 0. Pay attention to the end of the responsibility, will pass the test to prove that there is no problem 1. Based on the Java socket implementation of client/server functions, transmission mode with TCP2. The client lets the user enter infix expression, and then converts the function of the infix expression call Mybc.java to the suffix expression, and the suffix expression is encrypted with the 3DES or AES algorithm through the network to send the MD5 of ciphertext and plaintext to server 3. The client and server use the DH algorithm for the 3DES or AES algorithm key exchange 4. After the server receives the suffix expression expression, decrypts, decrypts the MD5 value of the plaintext, compares it to the MD5 from the client, and then calls the Mydc.java function to compute the value of the suffix expression and sends the result to client 5. The client displays the results sent by the server.

20145234 Huangfei "Java Programming" experiment five-network security and programming

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.