Introduction - If you have any usage issues, please Google them yourself
Complete centralized allocation symmetric key
Description: As a communication between the parties A and B, respectively, and the KDC already has a session key Ka and Kb, but the A, B no secret passage between the advance, they need to rely on the KDC allocate temporary session key Ks. Upon completion of the session key Ks allocation, A Ks on the use of a specific file (test-1.txt) is encrypted and sent to B B use Ks decrypt the ciphertext, and compare the decrypted plaintext message with the original files are consistent.
Requirements:
(1) JAVA programming language, based on the DES symmetric cryptographic techniques to complete the encryption/decryption (JAVA library functions are supported)
(2) the content of communications as a text file (test-1.txt)
(3) complete network-based key distribution job (as the communication between the parties A, B should be deployed on both hosts, KDC can be deployed on one host or a third host)
(4) are allocated once a secret symmetric key ra