Build a file server from which a client can request files. Pick a programming language and...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Build a file server from which a client can request files. Pick a programming language and investigate how to use its networking libraries. Conduct some research on network or socket programming in the language you choose. I recommend Python, Java or C++. Build on the above so as to provide confidentiality of the files transmitted by the server to the client. Use a symmetric key crypto algorithm such as AES in CBC mode. Generate a key on the server side. Export this key into a file. Using a "secure" channel, copy this file (key) to the client computer. File1.txt File2.txt Server Get File1.txt E(File1.txt,K) Get File2.txt E(File2.txt,K) Client Client decrypts files File1.txt and File2.txt Consult the crypto libraries for the programming language you chose. For example, for Java, do an Internet search on "Java Crypto library" or "Java encryption example". You can find crypto libs for C++ and Python as well. The goal is to learn how to use the crypto APIs for symmetric key encryption and decryption, key generation and for exporting the key so it can be shared between the client and the server. Build a file server from which a client can request files. Pick a programming language and investigate how to use its networking libraries. Conduct some research on network or socket programming in the language you choose. I recommend Python, Java or C++. Build on the above so as to provide confidentiality of the files transmitted by the server to the client. Use a symmetric key crypto algorithm such as AES in CBC mode. Generate a key on the server side. Export this key into a file. Using a "secure" channel, copy this file (key) to the client computer. File1.txt File2.txt Server Get File1.txt E(File1.txt,K) Get File2.txt E(File2.txt,K) Client Client decrypts files File1.txt and File2.txt Consult the crypto libraries for the programming language you chose. For example, for Java, do an Internet search on "Java Crypto library" or "Java encryption example". You can find crypto libs for C++ and Python as well. The goal is to learn how to use the crypto APIs for symmetric key encryption and decryption, key generation and for exporting the key so it can be shared between the client and the server.
Expert Answer:
Answer rating: 100% (QA)
We should have proper knowledge on how to use crypto APIs for symmetric key encryption and decryption next key generation and for exporting key so that it can be shared between client and server after ... View the full answer
Related Book For
Posted Date:
Students also viewed these programming questions
-
A limited partnership has three partners, all individuals: Gen ( the general partner ) , LimA ( a limited partner ) and LimB ( a limited partner ) . The original contributions and income / loss...
-
Case Study: Quick Fix Dental Practice Technology requirements Application must be built using Visual Studio 2019 or Visual Studio 2017, professional or enterprise. The community edition is not...
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
In Exercises, find the limit. x-4 lim x-00x + 1
-
Using a fast-pulsed laser and electronic timing circuitry, you find that light travels 2.50 m within a plastic rod in 11.5 ns. What is the refractive index of the plastic?
-
Researchers at Griffin University (Australia) conducted a study to determine whether video game players have superior visual attention skills compared to non-video game players. (Journal of Articles...
-
Use technology to find the regression line to predict $Y$ from $X$. $X$ 3 5 2 7 6 $Y$ 1 2 1.5 3 2.5
-
1. How did Allegro significantly improve click-through rates with Web analytics? 2. What were the challenges, the proposed solution, and the obtained results?
-
The general ledger of Karlin Company, a consulting firm, as of January 1, 2018, contained the following account balances: Account Title Debits Credits Cash 30,200 Accounts Receivable 15,500 Equipment...
-
Consider the Income Statement and Note 18 (Supplemental information) for General Mills below and answer the following questions. Assume revenue is presented gross of bad debt expense. a. Assume that...
-
Find the value of (up to 5 decimal places) using bisection method given that it lies in the interval (3,4). Include plots of (a) Approximated value vs. Iteration number, and (b) Absolute error vs....
-
Abel Plumbing Company's pickup truck, which had an actual cash value of $25,000 and a replacement cost of $30,000, was insured under a Business Auto Coverage Form for both collision and comprehensive...
-
Discuss the impact on the present value (PV) of a future lump sum as either the discount rate or the number of compounding periods per year increases .
-
Assume that the initial deposit margin on a Canadian dollar futures contract is $2,200. If a person purchases a contract at $0.75 per Canadian dollar and the contract involves 127,000 Canadian...
-
Analyzed various types of research articles and learned about different research processes in the sciences, humanities, and creative arts, it's time to put what you've learned into practice. In this...
-
Mac Tools has paid out a per-share dividend of $4 on its common stock for the year just ended.Analysts expect that the company's earnings and dividends per share will grow at a rate of 12% for the...
-
You received a radio report from an EMS team enroute with a pt. who may be having a stroke. The hospital CT scanner is broken. What should you do?
-
You continue to work in the corporate office for a nationwide convenience store franchise that operates nearly 10,000 stores. The per- store daily customer count (i.e., the mean number of customers...
-
The network of Fig. 5-34 uses RSVP with multicast trees for hosts 1 and 2 as shown. Suppose that host 3 requests a channel of bandwidth 2 MB/sec for a flow from host 1 and another channel of...
-
Although it was not mentioned in the text, an alternative form for a URL is to use the IP address instead of its DNS name. Use this information to explain why a DNS name cannot end with a digit.
-
A modem constellation diagram similar to Fig. 2-23 has data points at the following coordinates: (1, 1), (1, 1), (1, 1), and (1, 1). How many bps can a modem with these parameters achieve at 1200...
-
Define and discuss monetary policy. What specific actions can the Federal Reserve take to achieve its goals?
-
List actions that a government can take to establish its fiscal policy. What are some fiscal policies specifically targeted to the sport industry?
-
Define microeconomics and macroeconomics. What are the main differences between the two?
Study smarter with the SolutionInn App