UID:
almahu_9948025925902882
Format:
1 online resource (177 p.)
ISBN:
1-281-03377-4
,
9786611033774
,
0-08-053524-0
Series Statement:
The Practical Guides
Content:
For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about such a critical topic. I am sure that this book will contribute greatly to the success of securing Java applications and deployments for e-business. --Anthony Nadalin, Java Security Lead Architect, IBMFor many Java developers and software engineers, cryptography is an ""on-demand"" programming exercise, where cryptographi
Note:
Description based upon print version of record.
,
Front Cover; Java Cryptography Extensions: Practical Guide for Programmers; Copyright Page; Contents; Preface; Chapter 1. Understanding Java's Cryptographic Architecture; 1.1 Java and Cryptography; 1.2 Java Cryptography Architecture; 1.3 Java Cryptography Extension (JCE); 1.4 Understanding the Service Provider Interface Architecture; 1.5 Installing Providers; 1.6 JCA Helper Classes; 1.7 Working with Jurisdiction Policy Files; Chapter 2. Working with Symmetric Ciphers; 2.1 Random Number Generation; 2.2 The SecureRandom Engine; 2.3 The KeyGenerator Engine; 2.4 Avoiding Opaque Keys
,
2.5 Categorizing Symmetric Ciphers2.6 Padding and Cipher Modes; 2.7 The Cipher Engine; 2.8 Password Based Encryption; 2.9 Bringing Order to Chaos: Picking a Cipher; Chapter 3. Working with Asymmetric Ciphers and Key Agreement Protocols; 3.1 The KeyPairGenerator Engine; 3.2 Revisiting the Cipher Engine; 3.3 Comparing Keys for Equality; 3.4 Looking to the Future: Elliptic Curve Cryptography; 3.5 The KeyAgreement Engine; Chapter 4. Message Digests, Message Authentication Codes, and Digital Signatures; 4.1 Choosing a Message Digest Algorithm; 4.2 The MessageDigest Engine; 4.3 The Mac Engine
,
4.4 Digital Signatures4.5 The Signature Engine; Chapter 5. Managing Keys and Certificates; 5.1 The Need for Key Management; 5.2 Digital Certificates Defined; 5.3 The KeyStore Engine; 5.4 The CertificateFactory Engine; 5.5 Conclusion; Bibliography; Index
,
English
Additional Edition:
ISBN 0-12-742751-1
Language:
English
Bookmarklink