20165339 Experiment 3 "Agile Development and XP Practice" Experiment Report

Experimental procedure

  • Refer to http://www.cnblogs.com/rocedu/p/4795776.html, replace the content of Eclipse with IDEA

  • Refer to http://www.cnblogs.com/rocedu/p/6371315.html#SECCODESTANDARD to install the alibaba plugin to solve the specification problem in the code.

  • Use the tool (Code->Reformate Code) in IDEA to reformat the following code, and then study the Code menu to find a function that makes you feel the best. Submit a screenshot and add your student ID watermark.
    - install Settings ->Plugins -> Browse repositories...inalibaba

After use, the code will be standardized, and the problem areas will be marked. alibaba divides the problem into three levels: block/critical/major. Modified according to the error message.

  • Add your learning partner to your own project on the code cloud. After confirming that the partner's project is added to yourself, download the Complex code of partner experiment 2, add no less than three JUnit unit test cases, and git add .; git after the test is successful commit -m "Add content to your student number"; git push;

  • Submit a screenshot of the partner project git log, including the above git commit information, and add your own student number watermark information.

  • http://www.cnblogs.com/rocedu/p/4795776.html , the content of Eclipse is replaced with IDEA

  • Complete the refactoring exercises, download your partner's code, perform at least three refactorings, submit a screenshot of the refactored code, and add your own student ID watermark. Submit your partner's code cloud project link.

  • Refer to http://www.cnblogs.com/rocedu/p/6683948.html to complete the learning of Java cryptography related content in pairs, combining refactoring, git, and code standards .

  • Submit the learning outcome code cloud link and representative results screenshots, with a student ID watermark.

    Cryptography includes 密码编码学(Cryptography)and 密码分析学(Cryptanalyst)two branches.

  • Cryptography: It mainly studies how to encode information and how to realize the concealment of information, which is the basis of cryptography theory and the basis of security system design.
  • Cryptanalysis: It mainly studies the deciphering of encrypted messages or the forgery of messages. It is the most direct means to test the security of a cryptosystem. Only a cryptosystem that has passed the actual cryptanalysis test is truly usable.

    The Java security architecture is divided into 4 parts:

  • JCA (Java Cryptography Architecture, Java Cryptography Architecture): JCA provides basic encryption framework, such as certificate, digital signature, message digest and key pair generator.
  • JCE (Java Cryptography Extension, Java Encryption Extension Package): JCE is extended on the basis of JCA, and provides various encryption algorithms, message digest algorithms and key management functions. The implementation of JCE is mainly in the javax.crypto package (and its subpackages)
  • JSSE (Java Secure Sockets Extension, Java Secure Sockets Extension): JSSE provides encryption based on SSL (Secure Sockets Layer, Secure Sockets Layer). In the process of network transmission, information will pass through multiple hosts (it is very likely that one of them will be eavesdropped), and finally transmitted to the receiver, which is not safe. This service to ensure network communication security is provided by JSSE.
  • JAAS (Java Authentication and Authentication Service, Java Authentication and Security Service): JAAS provides the function of user authentication on the Java platform.

Code cloud link

Guess you like

Origin http://43.154.161.224:23101/article/api/json?id=325387821&siteId=291194637