Java Cryptography Extensions : Practical Guide for Programmers


Jason R. Weiss
Bok Engelsk 2004 · Electronic books.
Annen tittel
Utgitt
Burlington : : Elsevier Science, , 2004.
Omfang
1 online resource (177 p.)
Opplysninger
Description based upon print version of record.. - Front Cover; Java Cryptography Extensions: Practical Guide for Programmers; Copyright Page; Contents; Preface; Chapter 1. Understanding Java's Cryptographic Architecture; 1.1 Java and Cryptography; 1.2 Java Cryptography Architecture; 1.3 Java Cryptography Extension (JCE); 1.4 Understanding the Service Provider Interface Architecture; 1.5 Installing Providers; 1.6 JCA Helper Classes; 1.7 Working with Jurisdiction Policy Files; Chapter 2. Working with Symmetric Ciphers; 2.1 Random Number Generation; 2.2 The SecureRandom Engine; 2.3 The KeyGenerator Engine; 2.4 Avoiding Opaque Keys. - 2.5 Categorizing Symmetric Ciphers2.6 Padding and Cipher Modes; 2.7 The Cipher Engine; 2.8 Password Based Encryption; 2.9 Bringing Order to Chaos: Picking a Cipher; Chapter 3. Working with Asymmetric Ciphers and Key Agreement Protocols; 3.1 The KeyPairGenerator Engine; 3.2 Revisiting the Cipher Engine; 3.3 Comparing Keys for Equality; 3.4 Looking to the Future: Elliptic Curve Cryptography; 3.5 The KeyAgreement Engine; Chapter 4. Message Digests, Message Authentication Codes, and Digital Signatures; 4.1 Choosing a Message Digest Algorithm; 4.2 The MessageDigest Engine; 4.3 The Mac Engine. - 4.4 Digital Signatures4.5 The Signature Engine; Chapter 5. Managing Keys and Certificates; 5.1 The Need for Key Management; 5.2 Digital Certificates Defined; 5.3 The KeyStore Engine; 5.4 The CertificateFactory Engine; 5.5 Conclusion; Bibliography; Index. - For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about such a critical topic. I am sure that this book will contribute greatly to the success of securing Java applications and deployments for e-business. --Anthony Nadalin, Java Security Lead Architect, IBMFor many Java developers and software engineers, cryptography is an ""on-demand"" programming exercise, where cryptographi
Emner
Sjanger
Dewey
ISBN
0127427511

Bibliotek som har denne