Java Cryptography Extensions -  Jason R. Weiss

Java Cryptography Extensions (eBook)

Practical Guide for Programmers
eBook Download: PDF
2004 | 1. Auflage
176 Seiten
Elsevier Science (Verlag)
978-0-08-053524-1 (ISBN)
Systemvoraussetzungen
25,35 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about such a critical topic. I am sure that this book will contribute greatly to the success of securing Java applications and deployments for e-business. --Anthony Nadalin, Java Security Lead Architect, IBM

For many Java developers and software engineers, cryptography is an on-demand programming exercise, where cryptographic concepts are shelved until the next project requires renewed focus. But considerations for cryptography must be made early on in the design process and it's imperative that developers know what kinds of solutions exist.

One of Java's solutions to help bridge the gap between academic research and real-world problem solving comes in the form of a well-defined architecture for implementing cryptographic solutions. However, to use the architecture and its extensions, it is important to recognize the pros and cons of different cryptographic algorithms and to know how to implement various devices like key agreements, digital signatures, and message digests, to name a few.

In Java Cryptography Extensions (JCE), cryptography is discussed at the level that developers need to know to work with the JCE and with their own applications but that doesn't overwhelm by packing in details unimportant to the busy professional. The JCE is explored using numerous code examples and instructional detail, with clearly presented sections on each aspect of the Java library. An online open-source cryptography toolkit and the code for all of the examples further reinforces the concepts covered within the book. No other resource presents so concisely or effectively the exact material needed to begin utilizing the JCE.

* Written by a seasoned veteran of both cryptography and server-side programming
* Covers the architecture of the JCE, symmetric ciphers, asymmetric ciphers, message digests, message authentication codes, digital signatures, and managing keys and certificates
* Includes a companion web site that contains the code for the examples in the book, open-source cryptographic toolkits, and further resources
For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about such a critical topic. I am sure that this book will contribute greatly to the success of securing Java applications and deployments for e-business. --Anthony Nadalin, Java Security Lead Architect, IBMFor many Java developers and software engineers, cryptography is an "e;on-demand"e; programming exercise, where cryptographic concepts are shelved until the next project requires renewed focus. But considerations for cryptography must be made early on in the design process and it's imperative that developers know what kinds of solutions exist. One of Java's solutions to help bridge the gap between academic research and real-world problem solving comes in the form of a well-defined architecture for implementing cryptographic solutions. However, to use the architecture and its extensions, it is important to recognize the pros and cons of different cryptographic algorithms and to know how to implement various devices like key agreements, digital signatures, and message digests, to name a few.In Java Cryptography Extensions (JCE), cryptography is discussed at the level that developers need to know to work with the JCE and with their own applications but that doesn't overwhelm by packing in details unimportant to the busy professional. The JCE is explored using numerous code examples and instructional detail, with clearly presented sections on each aspect of the Java library. An online open-source cryptography toolkit and the code for all of the examples further reinforces the concepts covered within the book. No other resource presents so concisely or effectively the exact material needed to begin utilizing the JCE. - Written by a seasoned veteran of both cryptography and server-side programming- Covers the architecture of the JCE, symmetric ciphers, asymmetric ciphers, message digests, message authentication codes, digital signatures, and managing keys and certificates

Front Cover 1
Java Cryptography Extensions: Practical Guide for Programmers 4
Copyright Page 5
Contents 8
Preface 12
Chapter 1. Understanding Java's Cryptographic Architecture 18
1.1 Java and Cryptography 20
1.2 Java Cryptography Architecture 21
1.3 Java Cryptography Extension (JCE) 24
1.4 Understanding the Service Provider Interface Architecture 25
1.5 Installing Providers 26
1.6 JCA Helper Classes 30
1.7 Working with Jurisdiction Policy Files 44
Chapter 2. Working with Symmetric Ciphers 46
2.1 Random Number Generation 47
2.2 The SecureRandom Engine 48
2.3 The KeyGenerator Engine 50
2.4 Avoiding Opaque Keys 53
2.5 Categorizing Symmetric Ciphers 57
2.6 Padding and Cipher Modes 59
2.7 The Cipher Engine 63
2.8 Password Based Encryption 76
2.9 Bringing Order to Chaos: Picking a Cipher 81
Chapter 3. Working with Asymmetric Ciphers and Key Agreement Protocols 84
3.1 The KeyPairGenerator Engine 86
3.2 Revisiting the Cipher Engine 95
3.3 Comparing Keys for Equality 101
3.4 Looking to the Future: Elliptic Curve Cryptography 101
3.5 The KeyAgreement Engine 102
Chapter 4. Message Digests, Message Authentication Codes, and Digital Signatures 118
4.1 Choosing a Message Digest Algorithm 119
4.2 The MessageDigest Engine 120
4.3 The Mac Engine 124
4.4 Digital Signatures 128
4.5 The Signature Engine 130
Chapter 5. Managing Keys and Certificates 136
5.1 The Need for Key Management 136
5.2 Digital Certificates Defined 137
5.3 The KeyStore Engine 138
5.4 The CertificateFactory Engine 149
5.5 Conclusion 167
Bibliography 170
Index 172

Erscheint lt. Verlag 18.5.2004
Sprache englisch
Themenwelt Sachbuch/Ratgeber
Informatik Netzwerke Sicherheit / Firewall
Informatik Programmiersprachen / -werkzeuge Java
Informatik Theorie / Studium Kryptologie
Mathematik / Informatik Informatik Web / Internet
Naturwissenschaften
ISBN-10 0-08-053524-0 / 0080535240
ISBN-13 978-0-08-053524-1 / 9780080535241
Haben Sie eine Frage zum Produkt?
PDFPDF (Adobe DRM)

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
34,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99