Description

Book Synopsis
Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates, which prove identity (authentication); and digital signatures, which ensure your data has not been damaged or tampered with. This book covers cryptographic programming in Java. Java 1.1 and Java 1.2 provide extensive support for cryptography with an elegant architecture, the Java Cryptography Architecture (JCA). Another set of classes, the Java Cryptography Extension (JCE), provides additional cryptographic functionality. This book covers the JCA and the JCE from top to bottom, describing the use of the cryptographic classes as well as their innards. The book is designed for moderately experienced Java programmers who want to learn how to build cryptography into their applications. No prior knowledge of cryptography is assumed. The book is peppered with useful examples, ranging from simple demonstrations in the first chapter to full-blown applications in later chapters. Topics include: * The Java Cryptography Architecture (JCA) * The Java Cryptography Extension (JCE) * Cryptographic providers * The Sun key management tools * Message digests, digital signatures, and certificates (X509v3) * Block and stream ciphers * Implementations of the ElGamal signature and cipher algorithms * A network talk application that encrypts all data sent over the network * An email application that encrypts its messages Covers JDK 1.2 and JCE 1.2.

Table of Contents
Preface. 1. Introduction Secure Systems Cryptography Platform Security Astute Inequalities Hello, zoT1wy1njA0=! 2. Concepts Confidentiality Integrity Authentication Random Numbers Algorithms. 3. Architecture Alphabet Soup Concept Classes API and SPI Factory Methods Standard Names The Provider Architecture Key Management Summary. 4. Random Numbers SecureRandom Self-Seeding Keyboard Timing SeederDialog. 5. Key Management Keys Key Generators Key Translators Key Agreement The Identity Key Management Paradigm The KeyStore Key Management Paradigm. 6. Authentication Message Digests MACs Signatures Certificates. 7. Encryption Streams and Blocks Block Ciphers Algorithms javax.crypto.Cipher Cipher's Close Relatives Passphrase Encryption Inside Cipher Hybrid Systems. 8. Signed Applets Renegade HotJava Navigator Internet Explorer Summary. 9. Writing a Provider Getting Started Adding the ElGamal Classes ElGamal Generating Keys Signature Cipher. 10. SafeTalk Using SafeTalk Under the Hood. 11. CipherMail Using CipherMail Under the Hood. 12. Outside the Box Application Design Decompilers and Bytecode Obfuscation Endpoint Security File Security Network Security Summary A. BigInteger B. Base64 C. JAR D. Javakey E. Quick Reference Index

Java Cryptography

Product form

£26.99

Includes FREE delivery

RRP £35.99 – you save £9.00 (25%)

Order before 4pm tomorrow for delivery by Mon 19 Jan 2026.

A Book by Jonathon Knudsen

Out of stock


    View other formats and editions of Java Cryptography by Jonathon Knudsen

    Publisher: O'Reilly Media
    Publication Date: 09/06/1998
    ISBN13: 9781565924024, 978-1565924024
    ISBN10: 1565924029

    Description

    Book Synopsis
    Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates, which prove identity (authentication); and digital signatures, which ensure your data has not been damaged or tampered with. This book covers cryptographic programming in Java. Java 1.1 and Java 1.2 provide extensive support for cryptography with an elegant architecture, the Java Cryptography Architecture (JCA). Another set of classes, the Java Cryptography Extension (JCE), provides additional cryptographic functionality. This book covers the JCA and the JCE from top to bottom, describing the use of the cryptographic classes as well as their innards. The book is designed for moderately experienced Java programmers who want to learn how to build cryptography into their applications. No prior knowledge of cryptography is assumed. The book is peppered with useful examples, ranging from simple demonstrations in the first chapter to full-blown applications in later chapters. Topics include: * The Java Cryptography Architecture (JCA) * The Java Cryptography Extension (JCE) * Cryptographic providers * The Sun key management tools * Message digests, digital signatures, and certificates (X509v3) * Block and stream ciphers * Implementations of the ElGamal signature and cipher algorithms * A network talk application that encrypts all data sent over the network * An email application that encrypts its messages Covers JDK 1.2 and JCE 1.2.

    Table of Contents
    Preface. 1. Introduction Secure Systems Cryptography Platform Security Astute Inequalities Hello, zoT1wy1njA0=! 2. Concepts Confidentiality Integrity Authentication Random Numbers Algorithms. 3. Architecture Alphabet Soup Concept Classes API and SPI Factory Methods Standard Names The Provider Architecture Key Management Summary. 4. Random Numbers SecureRandom Self-Seeding Keyboard Timing SeederDialog. 5. Key Management Keys Key Generators Key Translators Key Agreement The Identity Key Management Paradigm The KeyStore Key Management Paradigm. 6. Authentication Message Digests MACs Signatures Certificates. 7. Encryption Streams and Blocks Block Ciphers Algorithms javax.crypto.Cipher Cipher's Close Relatives Passphrase Encryption Inside Cipher Hybrid Systems. 8. Signed Applets Renegade HotJava Navigator Internet Explorer Summary. 9. Writing a Provider Getting Started Adding the ElGamal Classes ElGamal Generating Keys Signature Cipher. 10. SafeTalk Using SafeTalk Under the Hood. 11. CipherMail Using CipherMail Under the Hood. 12. Outside the Box Application Design Decompilers and Bytecode Obfuscation Endpoint Security File Security Network Security Summary A. BigInteger B. Base64 C. JAR D. Javakey E. Quick Reference Index

    Recently viewed products

    © 2026 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account