Search and Find

Book Title

Author/Publisher

Table of Contents

Show eBooks for my device only:

 

Java Cryptography Extensions - Practical Guide for Programmers

Java Cryptography Extensions - Practical Guide for Programmers

of: Jason Weiss

Elsevier Trade Monographs, 2004

ISBN: 9780080535241 , 176 Pages

Format: PDF

Copy protection: DRM

Windows PC,Mac OSX Apple iPad, Android Tablet PC's

Price: 24,95 EUR



More of the content

Java Cryptography Extensions - Practical Guide for Programmers


 

Front Cover

1

Java Cryptography Extensions: Practical Guide for Programmers

4

Copyright Page

5

Contents

8

Preface

12

Chapter 1. Understanding Java's Cryptographic Architecture

18

1.1 Java and Cryptography

20

1.2 Java Cryptography Architecture

21

1.3 Java Cryptography Extension (JCE)

24

1.4 Understanding the Service Provider Interface Architecture

25

1.5 Installing Providers

26

1.6 JCA Helper Classes

30

1.7 Working with Jurisdiction Policy Files

44

Chapter 2. Working with Symmetric Ciphers

46

2.1 Random Number Generation

47

2.2 The SecureRandom Engine

48

2.3 The KeyGenerator Engine

50

2.4 Avoiding Opaque Keys

53

2.5 Categorizing Symmetric Ciphers

57

2.6 Padding and Cipher Modes

59

2.7 The Cipher Engine

63

2.8 Password Based Encryption

76

2.9 Bringing Order to Chaos: Picking a Cipher

81

Chapter 3. Working with Asymmetric Ciphers and Key Agreement Protocols

84

3.1 The KeyPairGenerator Engine

86

3.2 Revisiting the Cipher Engine

95

3.3 Comparing Keys for Equality

101

3.4 Looking to the Future: Elliptic Curve Cryptography

101

3.5 The KeyAgreement Engine

102

Chapter 4. Message Digests, Message Authentication Codes, and Digital Signatures

118

4.1 Choosing a Message Digest Algorithm

119

4.2 The MessageDigest Engine

120

4.3 The Mac Engine

124

4.4 Digital Signatures

128

4.5 The Signature Engine

130

Chapter 5. Managing Keys and Certificates

136

5.1 The Need for Key Management

136

5.2 Digital Certificates Defined

137

5.3 The KeyStore Engine

138

5.4 The CertificateFactory Engine

149

5.5 Conclusion

167

Bibliography

170

Index

172