Loading...

Messages

Proposals

Stuck in your homework and missing deadline?

Get Urgent Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework Writing

100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Report on Applying of Encryption Algorithms with RMI Protocol

Category: Engineering & Sciences Paper Type: Report Writing Reference: IEEE Words: 3600

Abstract of Applying of Encryption Algorithms with RMI Protocol

 There is brief information about the application of the encryption algorithms applied with RMI protocol. Moreover, the analysis is performed on two commonly used distributed models used in the Java system. The first one is the web services and the next one is RMI. Both of them are explained briefly in this paper. The main focus of the article is on the regular system and the secured variants because both are important features of the RMI. According to distributed models, the key information about the functional differences related to its implementation and the architecture are provided including performance on the operating systems like Linux and windows is also analyzed. The impact of these distributed models on the design system is analyzed on the distributed applications. Later on, in this article, there is also some information related to the Java RMI that is used for the Bluetooth systems. Additionally, there are some issues reported related to the efficient support of the Java RMI system used for the Bluetooth environment. For that case, there is a need to implement complete java RMI for the Bluetooth protocols. These protocols must support the L2CAP layer of the system that is connected with the RMI socket. Another thing is that this paper will also model the cost for the access patterns use for the java RMI communications with the other networks.

  I.     Introduction of Applying of Encryption Algorithms with RMI Protocol

It can be noted that Java’s RMI mechanism is considered as the object-oriented flavor of the RPC. In any RMI distribution, some features will help to increase the performance of the operating system. The first one is related to the stub compiler and its name is ‘rmic’. Through the help of this compiler, it will become extremely easy to generate marshaling and also unmarshaling code. Now the next important thing is that the binding of the system is taking place in the RMI protocol with the help of a server that is named as RMI registry [1]. It can be noted that the RMI is only using the TCP/ IP and other things to improve the reliability of the transported messages. Through this fact, there will be no need for any trouble in communication with the other network.

            The working of the RMI protocol [2] is quite simple. This is because working in the Java interface. Due to this case, the implementer of the server is writing the code in the Java interface. Furthermore, this code is followed by the unmarshaling code. This can be done easily with the help of a stub compiler. The main reason is that this compiler is only operated for the Java language [3]. Then after the implementation of the code, this specific service is completely available for creating an ideal instance of the server class where it will become quite simple to register it properly. But the main thing is that the register must be implemented with the help of the RMI registry. For that case, there is a need for a specific name given to the RMI registry. The name is that ‘naming.rebind().’ This is the style and procedure to give a name to the system [4]. Due to this case, there is a huge problem and that is related to the query. Some clients who can provide query about the RMI registry name. but this can be solved easily by giving this name ‘Naming.lookup()’. Due to this feature, if that particular registry of the RMI contains some information about the service then it will return to the client with the help of an object [5].

            Moreover, another thing in the RMI protocol is that the client can invoke the defined method used in the server without any difficulty. Due to this, it can easily be converted into a useful message and easily transmit it to the server without any difficulty [6]. Moreover, when this method is implemented and executed with the help of the RMI protocol. Then after this, it will return the main value in marshaled form and then this message is again returned towards the actual person without any difficulty. Now at the client end, the message again deserialized and the required goal is achieved. Moreover, it can be noted that the RMI protocol [7] is not different from the RPC system. But the main problem is that RPC systems are slow and it affects the communication at the client end [8].

                   II.    Research Questions of Applying of Encryption Algorithms with RMI Protocol

How it is possible to use encryption algorithms with the help of the RMI protocol?

What is the main difference between the AES and DES algorithm?

What kind of algorithms are the best suitable for applying it with RMI protocol?

                      III.  Literatur Review of Applying of Encryption Algorithms with RMI Protocol

       It is explained some efficient support for the Java RMI [9]. These systems are used for the heterogeneous wireless network. It can be noted that the distributed object-oriented networks are increasing daily. The next thing is that it is more important for the wireless environment to provide an efficient framework for implementing the RMI protocol for the wireless systems. This paper is discussing some important support for the Java RMI systems. These systems can be implemented easily in the Bluetooth, WLAN, GPRS environments in a simple way. For that case, there is a need to implement a proper software mechanism. This software mechanism can easily adopt the RMI protocol for the various networks without any difficulty. Moreover, it can be noted that it is considered as an important middleware for the communication of the components. This article is also discussing important features through which the system roaming can be improved by implementing RMI protocol benchmarks. The next thing is that all of these benchmarks are used for RMI communication over the different networks properly [10].

            In this paper, [9] was involved in giving proper information about the Mobile Java RMI support that can be implemented easily towards different wireless networks. The author had explained the main problem present in heterogeneous [11] wireless networks. This is because the Bluetooth layer is not properly encrypted with the help of the RMI protocol that creates a huge problem for the server. The next thing that this Bluetooth layer is just supported by the incorporating set of protocol stake layers. Such layers are mostly used to create a direct connection between different wireless devices. The author had efficiently solved this problem with the help of the RMI protocol used in wireless communications. Through the help of these protocols, it will create a dynamic address with dynamic sockets. This can be done easily by purposing algorithms for handling these handoff process [9].

                             IV.   Methodology of Applying of Encryption Algorithms with RMI Protocol

       In the methodology, the study is on the applying of an encryption algorithm with RMI protocols related to other studies. As the literature was done in the previous part, it is explained particular efficient support for Java RMI. The object-oriented java programming language is very significant for the networking environment to provide an effective framework to implement the protocol [12] for the wireless systems. It is also discussed in this study about some essential and significant support for the RMI systems implementation. There are some encryption algorithms are provided and explained in this document that how they can be implemented as well as how these algorithms can be beneficial RMI protocols. Furthermore, it is also explained the encryption algorithms for RMI protocols, some implementation or practical work is also given in this document. For further explanation, the brief information on the DES and AES is also provide

  lV.    Encryption Algorithm for RMI Protocol

In this section, there is complete information about the encryption protocols that can be implanted for the RMI protocol.

 

                    

Figure 1: Results after the client’s message

The above figure is giving the information when a client is sending a message to the main server. The result is showing that the message is delivered to the server through the help of the RMI protocol. For these messages, it is also showing the code that is followed through the encryption algorithms [13].

                 


Figure 2: implementation of the client message

       It can be noted that this application has consisted of two main applications. The first one is related to the server and the next one is the client. According to the given image, it can be noted that the name of the client is given as SimpleClient. On the other hand, the name of the server is given by SimpleServer. For that case, if there is a need to run the application then the server has to run this function at the start. Then after this when the server is sending the message it is displayed in the given figure above. This shows that the server is waiting for the response of the client. In this application, both the client and server are also creating a listening port and its number is given by according to this figure is 25000 [14].

       Now in the third line, it can be seen that when the client is involved in sending the encrypted message to the server then this message is also displayed in the terminal. This can be observer by checking the line 2 of the code. Then after this, sever is decrypting the main message and it can be seen easily from line 3. Now line 4 is showing information when the response from the required server is getting encrypted by the server. Then after this in the next line the response of the client can be seen easily [15].

According to this application, the AES algorithm is used for encrypting and decrypting the messages between the client and servers. Furthermore, another fact is that their response was completely static and saved internally in the system [16].

 

                  

Figure 3: Encryption of the client message

 

The above image is showing information about the encryption of the client message [17]. This can be done easily through the help of the DES algorithm. Moreover, it also shows the response of the server on the client screen.

 


Figure 4: decryption of the message

In this figure, there is complete information about the message from the clients just after decryption of the message. Another thing is that this figure is also showing that the response of the client just after the encryption of the message [18].

 


Figure 5: State of server

       In this figure, it can be noted that it is giving information about the state of the server. This stated is gain just after the response of the server. Moreover, this server is also waiting for the message from the client. Furthermore, it is also showing the information about the listening port in the last line of the figure. The next thing can be explained in simple words. There are about two main applications the first one is the client and the other is the server. Moreover, both of them are communicating with the help RMI protocol [19]. This protocol is giving them proper access so they can easily communicate with each other. Furthermore, the [20]required communication is decrypted and encrypted at the same time. This can be seen from every figure that is showing a complete send-receive step. This means that whenever a client wanted to send a message there is a need for encryption of the message before sending it towards the server [21]. After encryption of the message, it is sent to the server. On the other hand, the server is involved in decrypting the complete message and read it properly. Then after this when the server wanted to respond to the client, he will again encrypt that particular message and sent it to the client [22]. After this, the client will again decrypt the particular message from the client and read its response. This shows that both the client and server can send and receive any kind of message with the help of encryption and decryption process and this cycle can go towards infinite.

              VI.   Difference Between DES and aes of Applying of Encryption Algorithms with RMI Protocol

It can be noted that DES stands for the data encryption standard and on the other hand, AES is related to the advanced encryption standard. The basic difference between them is that in DES the data block is only divided into two halves. On the other hand, in AES [23] the whole data block is processed in a single matrix. The main principle behind both technologies is that the DES only works on the Feistel Cipher. On the other hand, AES is working on two principles that are substitution and permutation principle. The plaintext of the DES has consisted of only 64 bits and on the other hand, in AES it has consisted of 128, 192 and 256 bits [24].

According to the key size, it can be seen that the size of DES is quite smaller than the AES. Then the next difference is related to the number of rounds. It shows that there are about 16 rounds present in the DES. On the other hand, AES has consisted of 10 rounds for the 128-bit algorithm. Moreover, 12 rounds for only the 192-bit algorithm and 14 rounds for a 256-bit algorithm [25]. According to security purposes [26] it can be seen that DES containing the smaller key and that shows that it is less secure technology. On the other hand, in AES it is containing a huge security key that will create more security for the user [27].

According to the speed, DES is slower than the AES [28].

                                                                                       VII.  Ideal Recommendation for rmi Algorithm

It can be noted that AES is the ideal recommendation for the RMI protocol. This is because the AES algorithm technology is providing efficient security to the system at the time of the communication. This is because this algorithm is quite faster than the others. Due to this, it will provide efficient control to the whole system. Moreover, the server and clients [29] can send as many messages as they can, because the key size of the server is about 256. That is quite huge for ideal conversation. Moreover, this algorithm is providing efficient security to the whole system. This is because it contains a large key for security [30].  

                              VIII. Conclution of Applying of Encryption Algorithms with RMI Protocol

            Summing up all the discussion from above it is concluded that RMI protocol is playing a major role during communication between the wireless networks. The first feature is the stub compiler and its name is ‘rmic’. Through the help of this compiler, it will become extremely easy to generate marshaling and also unmarshaling code. The working of the RMI protocol is quite simple. This is because working in the Java interface. Now the next thing is that the implementer will also provide a specific class for the server that can easily implement this server without any problem. furthermore, it can be noted that the RMI protocol is similar to the RPC system. But RPC systems are slow and affect the communication at the client end. It can be noted that this application has consisted of two main applications. It can be noted that DES stands for the data encryption standard and on the other hand, AES is related to the advanced encryption standard. The main principle behind both technologies is that the DES only works on the Feistel Cipher. On the other hand, AES is working on two principles that are substitution and permutation principle. So, it will provide efficient control of the whole system. Moreover, the server and clients can send several messages.

REFERENCES of Applying of Encryption Algorithms with RMI Protocol

[1]

F. Breg, S. Diwan, J. Villacis, J. Balasubramanian, E. Akman and D. Gannon, "Java RMI performance and object model interoperability: Experiments with Java/HPC++.," Concurrency: Practice and Experience, , vol. 10, no. 1113, pp. 941-955., 1998.

[2]

D. Kurzyniec, T. Wrzosek, V. Sunderam and A. Slominski, "RMIX: A multiprotocol RMI framework for Java.," In Proceedings International Parallel and Distributed Processing Symposium, pp. 6-pp, 2003.

[3]

M. B. Juric, B. Kezmah, M. Hericko, I. Rozman and I. Vezocnik, "Java RMI, RMI tunneling and Web services comparison and performance analysis," ACM Sigplan Notices, Vols. 39(5), ., pp. 58-65, 2004.

[4]

J. KAWASH, G. SAMARA and A. H. M. A. D. EL-HALABI, "MORE EFFICIENT JAVA RMI FOR GPRS DEVICES," In New Trends In Computer Networks, pp. 144-153, 2005.

[5]

M. B. Juric, I. Rozman, B. Brumen, M. Colnaric and M. Hericko, "Comparison of performance of Web services, WS-Security, RMI, and RMI–SSL," Journal of Systems and Software, vol. 5, no. 689-700., p. 79, 2006.

[6]

Y. Liu, D. Xu, W. Song and Z. Mu, "Design and implementation of high performance IPSec applications with multi-core processors," In 2008 International Seminar on Future Information Technology and Management Engineering, pp. 595-598, 2008.

[7]

V. K. Dabhi and H. B. Prajapati, "Dissection of the internal workings of the RMI, possible enhancements and implementing authentication in standard Java RMI," International journal of networking and virtual organisations, vol. 7, no. 6, pp. 514-534., 2010.

[8]

C. W. Chen, J. K. Lee, H. W. Lin and W. J. Wu, "Efficient support of Java RMI over heterogeneous wireless networks.," In 2004 IEEE International Conference on Communications, pp. 1391-1395, 2004.

[9]

C.-K. Chen, C.-W. Chen and J.-K. L. a. J.-C. C. Chien-Tan Ko, "Mobile Java RMI support over heterogeneous wireless networks: A case study.," Journal of Parallel and Distributed Computing , 2008.

[10]

,. C.-K. C. J.-C. C. C.-T. K. J.-K. L. H.-W. L. a. W.-J. W. Cheng-Wei Chen, "Efficient support of Java RMI over heterogeneous wireless networks," In 2004 IEEE International Conference on Communications, 2004.

[11]

M. Kassar, B. Kervella and G. Pujolle, "An overview of vertical handover decision strategies in heterogeneous wireless networks," Computer communications, vol. 31, no. 10, pp. 2607-2620, 2008.

[12]

S. Campadello, O. Koskimies, K. Raatikainen and H. Helin, " Wireless java rmi.," In Proceedings Fourth International Enterprise Distributed Objects Computing Conference, pp. 114-123, 2000.

[13]

M. B. Juric, I. Rozman, B. Brumen, M. Colnaric and M. Hericko, " Comparison of performance of Web services, WS-Security, RMI, and RMI–SSL.," Journal of Systems and Software, vol. 79, no. 5, pp. 689-700., 2006.

[14]

P. C. Wei, C. H. Chen, C. W. Chen and J. K. Lee, "Support and optimization of Java RMI over a Bluetooth environment.," Concurrency and computation: Practice and experience, vol. 17, no. 7-8, pp. 967-989., 2005.

[15]

C. K. Chen, C. W. Chen, C. T. Ko, J. K. Lee and J. C. Chen, "Mobile Java RMI support over heterogeneous wireless networks: A case study.," Journal of Parallel and Distributed Computing, vol. 68, no. 11, pp. 1425-1436, 2008.

[16]

C. K. Chen, C. W. Chen, C. T. Ko, J. K. Lee and J. C. Chen, "Mobile Java RMI support over heterogeneous wireless networks: A case study.," Journal of Parallel and Distributed Computing, vol. 68, no. 11, pp. 1425-1436., 2008.

[17]

A. El-Sisi and H. M. Mousa, "Evaluation of Encryption Algorithms for Privacy Preserving Association Rules Mining.," IJ Network Security, , Vols. 14(5),, pp. 289-296., 2012.

[18]

S. Mauw and S. Piramuthu, "A PUF-based authentication protocol to address ticket-switching of RFID-tagged items.," In International Workshop on Security and Trust Management, pp. 209-224, 2012.

[19]

M. Burnside, D. Clarke, T. Mills, A. Maywah, S. Devada and R. Rivest, "Proxy-based security protocols in networked mobile devices.," In Proceedings of the 2002 ACM symposium on Applied computing, pp. 265-272, 2002.

[20]

E. Garcia and S. A. Pena, "System and method for controlling access to decrypted data," Patent and Trademark Office, 2014.

[21]

B. A. O. RuiXian, "Distributed Computing via RMI and CORBA.," Distributed Computing, 2004.

[22]

C. W. Chen, C. K. Chen, J. C. Chen, C. T. Ko, J. K. Lee, H. W. Lin and W. J. Wu, " Efficient support of Java RMI over heterogeneous wireless networks.," In 2004 IEEE International Conference on Communications , vol. 3, pp. 1391-1395, 2004.

[23]

P. C. Mandal, "Evaluation of performance of the Symmetric Key Algorithms: DES, 3DES, AES and Blowfish," Journal of Global Research in Computer Science, pp. 67-70., 2012.

[24]

M. L. Akkar and C. Giraud, "An implementation of DES and AES, secure against some attacks," In International Workshop on Cryptographic Hardware and Embedded Systems, pp. 309-318, 2001.

[25]

M. A. Mushtaque, H. Dhiman, S. Hussain and S. Maheshwari, "Evaluation of DES, TDES, AES, blowfish and two fish encryption algorithm: based on space complexity," International Journal of Engineering Research & Technology (IJERT), vol. 3, no. 4, 2014.

[26]

B. Padmavathi and S. R. Kumari, "A survey on performance analysis of DES, AES and RSA algorithm along with LSB substitution," performance analysis of DES, AES and RSA algorithm along, IJSR, 2013.

[27]

H. Kaur, "AN ALTERNATIVE ARCHITECTURE FOR IMPROVING AVALIBILITY AND FLEXIBILITY OF RMI REGISTRY," Doctoral dissertation, 2008.

[28]

K. M. A. Alheeti and A. Gruebler, "An Intrusion Detection System Against Black Hole Attacks n the Communication Network of Self-Driving Cars," 2015 Sixth International Conference on Emerging Security Technologies, 2015.

[29]

J. M. Dieterich and B. Hartke, " Error-safe, portable, and efficient evolutionary algorithms implementation with high scalability.," Journal of chemical theory and computation, vol. 12, no. 10, pp. 5226-5233, 2016.

[30]

J. KAWASH and a. A. H. M. A. D. E.-H. GHASSAN SAMARA, "MORE EFFICIENT JAVA RMI FOR GPRS DEVICES," In New Trends In Computer Networks, 2005.


Our Top Online Essay Writers.

Discuss your homework for free! Start chat

Top Rated Expert

ONLINE

Top Rated Expert

1869 Orders Completed

ECFX Market

ONLINE

Ecfx Market

63 Orders Completed

Assignments Hut

ONLINE

Assignments Hut

1428 Orders Completed