Showing posts with label java. Show all posts
Showing posts with label java. Show all posts

Wednesday, January 9, 2019

Java Development Company India



Oodles Technologies is a prominent Java Development Company in indian subcontinent and has carved a niche in the domain, offering business oriented and customer-centric Java Application Development Services to the industries across the globe.



Friday, December 8, 2017

ICO Development Company



 ICO Development Company


The trend of ICO coins is off to a great start. It’s turning out to be a great opportunity for the startups to kickstart their business. For those who are not familiar with this term, the Initial Coin Offering or simply ICO is an unregulated way of fundraising especially for a cryptocurrency venture. An ICO is a process of raising funds from the public via crowdfunding campaigns. The only difference is that in case of an ICO, the investors get returns in form of the newly generated digital coins rather than the fiat currency.



If a startup plans to raise money through an ICO, the first and foremost requirement is a white paper specifying the project details. The white paper also contains all the financial requirements for the project. During the initial stages of an ICO, the investors buy some cryptocoins with the fiat currency. If the ICO fails to meet the minimum financial requirements of the company, the money is returned to the investors to compensate their losses. On contrary to this, if the ICO turns out to be a success, the funds raised through it are used to execute the plan. The investors get profits as specified in the white paper.



Why Choose Oodles Technologies?

Oodles Technologies is a leading offshore software development company with vast experience in Blockchain and Cryptocurrency Development. We also provide world-class ICO Development Services at the most competent price. We provide a comprehensive development support for your ICO campaigns. From creating digital tokens to ICO Smart Contracts, we provide a one stop solution for all your ICO related endeavors.

Friday, December 1, 2017

Grails Development Services



Grails is an open-source web development framework for building dynamic web applications. It uses a coding by convention paradigm and an exclusively developed programming language called Groovy. Groovy is an object-oriented dynamic language for Java virtual Machine with some elements of Java that offer features similar to Ruby, Python, and Perl.

It is quite similar to other languages like Java, C, C++,
 Python, JavaScript, and Ruby. ty. It’s a high-productivity tool that uses Java technologies like Spring and Hibernates and offers a powerful development environment for building dynamic websites and web applications.

As compared to the other complex web development frameworks, Grails is quite easy to learn and master. It is one of the most powerful rapid application development (RAD) framework. The language, Groovy can also be used as a scripting language for the Java platform and it can be easily compiled to the JVM bytecode. Apart from that, Grails features dynamic methods on several classes via mixins.


Read more info at - http://www.oodlestechnologies.com/grails-development-services

Thursday, October 5, 2017

Data Security By Using Encryption And Decryption In Java

Encryption is a process of hiding the meaning of a part of the information and only authorized persons can read the actual data. This process is used to protect data that is being transferred from one location to another. This process is very much needed by a secure computing environment.


Decryption ->When we encrypt data then for the authorized person we need to decrypt that data. Encryption is also known as “cipher” and decryption process is “decipher”.


The methods which are providing security to our information, are given next level of security by “keys”. Now lets talk about keys , the one who is having key only that can encode and decode the information. Here in our code we have used the following API for encryption and decryption. The level of security of an encryption scheme is directly proportional to the its key size. Key sizes should be long enough due to which attacks become unfeasible.


Algorithms :

1.Symmetric encryption algorithms: This alogrithm uses the exactly same key for data encryption and  data decryption. For this algorithm use AES or AESWrap block cipher 2.Asymmetric (public key) encryption algorithms: This algorithm uses two different keys for both the processes. For this algorithm use RSA.


Following parameters should be configured correctly to configure any encryption scheme securely.

1.Choosing the correct algorithm
2.Choosing the correct operation mode
3.Choosing the right padding scheme
4.Choosing the right keys and their sizes

CODE DEMO FOR IMPLEMENTING ENCRYPTION AND DECRYPTION

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
<span style="font-size:16px;"><span style="font-family:arial,helvetica,sans-serif;">import java.security.Key;
import javax.crypto.*; 
import javax.crypto.spec.*;
import javax.xml.bind.DatatypeConverter;
import play.Play;
import play.Play;
public class EncryptionDecryptionUtil 
{
    private static final String ALG = "AES";
    private static final byte[] keyVal = new String( Play.application().configuration().getString("application.secret")).substring(016).getBytes();
    //To get encrypted value of a string
    public static String encrypt(String valToEnc) throws Exception
    {
        Key ky = generateKey();
        Cipher cph = Cipher.getInstance(ALG); 
        c.init(Cipher.ENCRYPT_MODE, ky);
        byte[] encValue = cph.doFinal(valToEnc.getBytes()); 
        String encryptedVal = DatatypeConverter.printBase64Binary(encValue); 
        return encryptedVal; }
    //To get decrypted value of a string
    public static String decrypt(String encryptedVal) throws Exception {
        Key ky = generateKey(); 
        Cipher c = Cipher.getInstance(ALG);
        c.init(Cipher.DECRYPT_MODE, ky); 
        byte[] decordedVal = DatatypeConverter.parseBase64Binary(encryptedVal);
        byte[] decValue = cph.doFinal(decordedVal);
        String decryptedVal = new String(decValue); 
        return decryptedVal;
        }
    private static Key generateKey() throws Exception 
    {
        Key ky = new SecretKeySpec(keyVal, ALG);
        return ky;
        }
    }
}<span style="white-space: normal;">
</span></span></span>