eBooks-it.org Logo
eBooks-IT.org Inner Image

Java Cryptography

Java Cryptography Image

Book Details:

Publisher:O'Reilly Media
Series: OReilly
Author:Jonathan B. Knudsen
Edition:1
ISBN-10:1565924029
ISBN-13:9781565924024
Pages:364
Published:May 08 1998
Posted:Nov 19 2014
Language:English
Book format:PDF
Book size:1.47 MB

Book Description:

Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates, which prove identity (authentication); and digital signatures, which ensure your data has not been damaged or tampered with.This book covers cryptographic programming in Java. Java 1.1 and Java 1.2 provide extensive support for cryptography with an elegant architecture, the Java Cryptography Architecture (JCA). Another set of classes, the Java Cryptography Extension (JCE), provides additional cryptographic functionality. This book covers the JCA and the JCE from top to bottom, describing the use of the cryptographic classes as well as their innards.The book is designed for moderately experienced Java programmers who want to learn how to build cryptography into their applications. No prior knowledge of cryptography is assumed. The book is peppered with useful examples, ranging from simple demonstrations in the first chapter to full-blown applications in later chapters.Topics include: The Java Cryptography Architecture (JCA) The Java Cryptography Extension (JCE) Cryptographic providers The Sun key management tools Message digests, digital signatures, and certificates (X509v3) Block and stream ciphers Implementations of the ElGamal signature and cipher algorithms A network talk application that encrypts all data sent over the network An email application that encrypts its messages Covers JDK 1.2 and JCE 1.2.

Download Link:

Related Books:

Introduction to Cryptography with Java Applets

Introduction to Cryptography with Java Applets Image
Introduction to Cryptography with Java Applets covers the mathematical basis of cryptography and cryptanalysis, like linear diophantine equations, linear congruences, systems of linear congruences, quadratic congruences, and exponential congruences. The chapters present theorems and proofs, and many mathematical examples. Cryptography with Java Applets also covers programming ciphers and cryptanalytic attacks on ciphers. In addition many other types of cryptographic applications, like digest functions, shadows, database encryption, message signing, establishing keys, large integer arithmetic, pseudo-random bit generation, and authentication are included. The author has developed various Java crypto classes to perform these functions, and many program...

Beginning Cryptography with Java

Beginning Cryptography with Java Image
Beginning Cryptography with JavaWhile cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how.This book teaches you how. Chapters one through five cover the architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN.1 packages, all with plenty of examples. Building on that foundation, the second half of the book takes you into higher-level topics, enabling you to create and implement secure Java applications and make use of standard p...

Cryptography for Internet and Database Applications

Developing Secret and Public Key Techniques with Java
Cryptography for Internet and Database Applications Image
Cryptography is the gold standard for security. It is used to protect the transmission and storage of data between two parties by encrypting it into an unreadable format. Cryptography has enabled the first wave of secure transmissions, which has helped fuel the growth of transactions like shopping, banking, and finance over the world's biggest public network, the Internet. Many Internet applications such as e-mail, databases, and browsers store a tremendous amount of personal and financial information, but frequently the data is left unprotected. Traditional network security is frequently less effective at preventing hackers from accessing this data. For instance, once-private databases are now completely exposed on the Internet. It turns out that ge...



2007 - 2021 © eBooks-IT.org