Cryptography and cryptanalysis in Java creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10
Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 17 and Jakarta EE 10. It provides a robust introduction to Java 17's new features and updates, a roadmap for Jakarta EE 10 security mechanis...
Otros Autores: | , |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
New York, NY :
Apress
[2022]
|
Edición: | [First edition] |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009657496706719 |
Tabla de Contenidos:
- Intro
- Table of Contents
- About the Authors
- About the Technical Reviewer
- Chapter 1: Introduction
- Cryptography and Cryptanalysis
- Book Structure
- Conclusion
- References
- Chapter 2: JDK 17: New Features
- Conclusion
- References
- Chapter 3: Roadmap and Vision for Jakarta EE 10
- Conclusion
- References
- Chapter 4: Java Cryptography Architecture
- Architecture and Design Principles
- JCA Classes and Algorithms
- Algorithms and Engine Classes
- Interfaces and Main Classes
- Data Encryption
- Hash Functions
- Signatures
- Generating Signatures
- Verifying the Signature
- Conclusion
- References
- Chapter 5: Classical Cryptography
- Caesar Cipher
- Implementation
- Cryptanalysis
- Vigenère Cipher
- Implementation
- Cryptanalysis
- Hill Cipher
- Implementation
- Cryptanalysis
- Conclusion
- References
- Chapter 6: Formal Techniques for Cryptography
- Definitions
- Probabilities and Statistics
- Conditional Probability
- Random Variables
- Entropy
- A Little Algebra
- Elliptic Curves
- Conclusion
- References
- Chapter 7: Pseudorandom Number Generators
- Examples of PRNGs
- Linear Congruential PRNGs
- Blum-Blum-Shub PRNG
- Linear Circuit PRNGs
- Other PRNGs
- PRNGs Security
- Java.util.Random Class
- Conclusion
- References
- Chapter 8: Hash Functions
- Conclusion
- References
- Chapter 9: Symmetric Encryption Algorithms
- Data Encryption Standard
- The Generation of Keys
- Encryption and Decryption Process
- Operation Modes for DES
- Advanced Encryption Standard
- Encryption and Decryption Process
- Operation Modes for AES
- Conclusion
- References
- Chapter 10: Asymmetric Encryption Schemes
- RSA
- ElGamal
- Merkle-Hellman
- The Knapsack Approach
- Algorithms
- Conclusion
- References
- Chapter 11: Signature Schemes
- Conclusion
- References.
- Chapter 12: Identification Schemes
- FFS Identification protocol
- Conclusion
- References
- Chapter 13: Lattice-Based Cryptography and NTRU
- Practical Implementation of the NTRU Library
- Conclusion
- References
- Chapter 14: Advanced Encryption Schemes
- Homomorphic Encryption
- Searchable Encryption
- Conclusion
- References
- Chapter 15: Cryptography Tools
- CryptTool
- OpenSSL
- Conclusion
- References
- Index.