Java cryptography

Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects the secrecy of your data; cryptographic cer...

Descripción completa

Detalles Bibliográficos
Autor principal: Knudsen, Jonathan (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Beijing ; Sebastopol, California : O'Reilly 1998.
Edición:First edition
Colección:Java series Java cryptography
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627346006719
Tabla de Contenidos:
  • Table of Contents; Preface; Who Are You?; About This Book; What's Not in This Book; About the Examples; Versions; File Naming; CLASSPATH; Variable Naming; Downloading; Font Conventions; Request for Comments; Acknowledgments; Chapter 1. Introduction; Secure Systems; Cryptography; Platform Security; Astute Inequalities; Hello, zoT1wy1njA0=!; Masher; SecretWriting; Chapter 2. Concepts; Confidentiality; Symmetric Ciphers; Asymmetric Ciphers; Hybrid Systems; Distributing Keys; Key Agreement Protocols; Integrity; Authentication; Certificates; Certificate Chains; Random Numbers; Algorithms
  • Size Does MatterNames and Numbers; MD5; SHA-1; HmacMD5 and HmacSHA1; DSA; ElGamal signatures; DES; DESede; PBEWithMD5AndDES; ElGamal ciphers; DH; Chapter 3. Architecture; Alphabet Soup; Concept Classes; API and SPI; Factory Methods; Standard Names; The Provider Architecture; Key Management; Summary; Chapter 4. Random Numbers; SecureRandom; Self-Seeding; Keyboard Timing; Seeder; Counter; Pitfalls; SeederDialog; Chapter 5. Key Management; Keys; Key Generators; KeyPairGenerator; KeyGenerator; Algorithm-Specific Initialization; Key Translators; SecretKeySpec; SecretKeyFactory; From things to keys
  • From keys to thingsKeyFactory; Key Agreement; Diffie-Hellman; javax.crypto.KeyAgreement; SKIP; SkipServer; SkipClient; Skipper: Multiparty key agreement; The Identity Key Management Paradigm; Key Holders; Principal; Identity; Signer; IdentityScope; KeyManager; The KeyStore Key Management Paradigm; KeyStore; Getting; Loading and saving; Adding private key entries; Adding trusted certificate entries; Retrieving entries; keytool; Creating a key pair; Ubiquitous options and defaults; Inspecting the keystore; Generating a CSR; Importing certificates; Other options
  • Changing the default keystore classChapter 6. Authentication; Message Digests; Getting; Feeding; Digesting; One, Two, Three!; Digest Streams; Protected Password Login; Double-Strength Password Login; MACs; Setting Up; Feeding; Calculating the Code; For Instance; Signatures; Generating a Signature; Verifying a Signature; Hancock; Login, Again; SignedObject; Certificates; java.security.cert.Certificate; Generating a Certificate; Verifying a Certificate; X.509; Spill; Certificate Revocation Lists; Chapter 7. Encryption; Streams and Blocks; Block Ciphers; Padding; PKCS#5; Other padding schemes
  • ModesECB; CBC; PCBC; CFB; OFB; Other modes; Algorithms; javax.crypto.Cipher; Getting a Cipher; Basic Information; Initializing a Cipher; Generic; Name brand; Feeding Data to a Cipher; Cipher's Close Relatives; Cipher Streams; javax.crypto.SealedObject; Passphrase Encryption; Salt and Vinegar; Test Drive; Inside Cipher; SPI; Setup; Basic information; Initializing; Feeding; BlockCipher; CBCWrapper; CFBWrapper; Hybrid Systems; PGP; S/MIME; SSL; Sources; Using the browser; SET; Chapter 8. Signed Applets; Renegade; HotJava; Prepare a Signer; Bundle the Applet; Sign the Applet; Test the Applet
  • Set Up the Browser