Search and Find
Service
Front Cover
1
Java Cryptography Extensions: Practical Guide for Programmers
4
Copyright Page
5
Contents
8
Preface
12
Chapter 1. Understanding Java's Cryptographic Architecture
18
1.1 Java and Cryptography
20
1.2 Java Cryptography Architecture
21
1.3 Java Cryptography Extension (JCE)
24
1.4 Understanding the Service Provider Interface Architecture
25
1.5 Installing Providers
26
1.6 JCA Helper Classes
30
1.7 Working with Jurisdiction Policy Files
44
Chapter 2. Working with Symmetric Ciphers
46
2.1 Random Number Generation
47
2.2 The SecureRandom Engine
48
2.3 The KeyGenerator Engine
50
2.4 Avoiding Opaque Keys
53
2.5 Categorizing Symmetric Ciphers
57
2.6 Padding and Cipher Modes
59
2.7 The Cipher Engine
63
2.8 Password Based Encryption
76
2.9 Bringing Order to Chaos: Picking a Cipher
81
Chapter 3. Working with Asymmetric Ciphers and Key Agreement Protocols
84
3.1 The KeyPairGenerator Engine
86
3.2 Revisiting the Cipher Engine
95
3.3 Comparing Keys for Equality
101
3.4 Looking to the Future: Elliptic Curve Cryptography
101
3.5 The KeyAgreement Engine
102
Chapter 4. Message Digests, Message Authentication Codes, and Digital Signatures
118
4.1 Choosing a Message Digest Algorithm
119
4.2 The MessageDigest Engine
120
4.3 The Mac Engine
124
4.4 Digital Signatures
128
4.5 The Signature Engine
130
Chapter 5. Managing Keys and Certificates
136
5.1 The Need for Key Management
136
5.2 Digital Certificates Defined
137
5.3 The KeyStore Engine
138
5.4 The CertificateFactory Engine
149
5.5 Conclusion
167
Bibliography
170
Index
172
All prices incl. VAT