Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In

Have an account? Sign In Now

Sign In

Login to our social questions & Answers Engine to ask questions answer people’s questions & connect with other people.

Sign Up Here

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Have an account? Sign In Now

You must login to ask a question.

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Sign InSign Up

The Archive Base

The Archive Base Logo The Archive Base Logo

The Archive Base Navigation

  • Home
  • SEARCH
  • About Us
  • Blog
  • Contact Us
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Add group
  • Groups page
  • Feed
  • User Profile
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Buy Points
  • Users
  • Help
  • Buy Theme
  • SEARCH
Home/ Questions/Q 6140749
In Process

The Archive Base Latest Questions

Editorial Team
  • 0
Editorial Team
Asked: May 23, 20262026-05-23T18:09:32+00:00 2026-05-23T18:09:32+00:00

I am developing a web application that will redirect users to an outside web

  • 0

I am developing a web application that will redirect users to an outside web application. I would like to encrypt the redirect url so the users can not directly modify the url. The outside vendor would like to use triple DES. Here is my questions:

  1. I assume that the developers of the outside web application and I will have to exchange some sort of “Secret key” so we can decrypt and encrypt the url, is that a correct?

  2. Is this “Secret Key” some sort of file or some sequence of characters we can perhaps initially exchange via email?

  3. Does it matter that I am writing my web app in Java and the outside vendor is writing their web app in .NET?

  • 1 1 Answer
  • 0 Views
  • 0 Followers
  • 0
Share
  • Facebook
  • Report

Leave an answer
Cancel reply

You must login to add an answer.

Forgot Password?

Need An Account, Sign Up Here

1 Answer

  • Voted
  • Oldest
  • Recent
  • Random
  1. Editorial Team
    Editorial Team
    2026-05-23T18:09:33+00:00Added an answer on May 23, 2026 at 6:09 pm

    Sounds like you need to sign the request parameters, rather than encrypt them. You could try something like this;

    1) Create a string of the data you want to protect with a digital signature, for example if your URL is;

    http://www.example.com/doCourse?userid=123&courseid=abc

    and you want to protect the userid and courseid parameters you create a string;

    courseid=abc&userid=123

    Note that in cases such as these it is normal to create the string with the parameters in alphabetical order.

    2) Use a Message Authentication Code with a cryptographic hash function such as SHA-1 to generate a hash of your string.

    Do this with;

    Key key = ..... //You need to agree a key with the other party.
    String string = ..... //The data you want to sign eg "courseid=abc&userid=123"
    Mac mac = Mac.getInstance("HMAC-SHA1");
    mac.init(key);
    byte[] result = mac.doFinal(string.getBytes("UTF-8");
    

    The MAC basically uses a secret key (which you agree with the other party in advance) to generate a hash of the data.

    3) Base64 encode, then URLEncode the result and include it on the redirect as a parameter (call it something like ‘signature’).

    4) The other party performs the same actions as you, they generate the string, use a MAC to create a hash, base64 encode and URL encode. Next, they compare the signature on the request with the one they have generated. If it is the same then the parameters have not been tampered with. If the hash is different then the user must have modified them.

    You may want to also include a cryptographic nonce with the request to prevent replay attacks. If you use a nonce, make sure you include the nonce parameter and value in the string you use to generate the signature (ensures the user can’t tamper with the nonce).

    Advantages over encryption

    • URLs are not obscufated at the expense of supporting this in the web apps.
    • Security can be achieved with a simple filter in front of the web app that just checks signatures.
    • You can tell whether the user has modified the data, which cannot be guaranteed just by encryption. With TDES the user may alter the ciphertext and accidently create a valid but different plaintext.
    • 0
    • Reply
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
      • Report

Sidebar

Related Questions

I'm developing a web application that will enable users to post short status updates
I'm developing a Web application that will let users upload images. My concern is
We are developing a web application that will be sold to many clients. There
I'm developing a web application that is targeted at IE and during testing would
I'm developing a web application that will need to be localized to English and
We have plans of developing a web application that will have to communicate with
Greetings friends, I am developing a web application that will allow the customer to
I am developing a web application that will require use of a MySQL database
I am looking to start developing a relatively simple web application that will pull
I'm developing an application that makes heavy use of web services. I will be

Explore

  • Home
  • Add group
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Users
  • Help
  • SEARCH

Footer

© 2021 The Archive Base. All Rights Reserved
With Love by The Archive Base

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.