Cryptography and cryptanalysis in Java creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10

Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 17 and Jakarta EE 10. It provides a robust introduction to Java 17's new features and updates, a roadmap for Jakarta EE 10 security mechanis...

Descripción completa

Detalles Bibliográficos
Otros Autores: Nita, Stefania Loredana, author (author), Mihailescu, Marius Iulian, author
Formato: Libro electrónico
Idioma:Inglés
Publicado: New York, NY : Apress [2022]
Edición:[First edition]
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009657496706719
Tabla de Contenidos:
  • Intro
  • Table of Contents
  • About the Authors
  • About the Technical Reviewer
  • Chapter 1: Introduction
  • Cryptography and Cryptanalysis
  • Book Structure
  • Conclusion
  • References
  • Chapter 2: JDK 17: New Features
  • Conclusion
  • References
  • Chapter 3: Roadmap and Vision for Jakarta EE 10
  • Conclusion
  • References
  • Chapter 4: Java Cryptography Architecture
  • Architecture and Design Principles
  • JCA Classes and Algorithms
  • Algorithms and Engine Classes
  • Interfaces and Main Classes
  • Data Encryption
  • Hash Functions
  • Signatures
  • Generating Signatures
  • Verifying the Signature
  • Conclusion
  • References
  • Chapter 5: Classical Cryptography
  • Caesar Cipher
  • Implementation
  • Cryptanalysis
  • Vigenère Cipher
  • Implementation
  • Cryptanalysis
  • Hill Cipher
  • Implementation
  • Cryptanalysis
  • Conclusion
  • References
  • Chapter 6: Formal Techniques for Cryptography
  • Definitions
  • Probabilities and Statistics
  • Conditional Probability
  • Random Variables
  • Entropy
  • A Little Algebra
  • Elliptic Curves
  • Conclusion
  • References
  • Chapter 7: Pseudorandom Number Generators
  • Examples of PRNGs
  • Linear Congruential PRNGs
  • Blum-Blum-Shub PRNG
  • Linear Circuit PRNGs
  • Other PRNGs
  • PRNGs Security
  • Java.util.Random Class
  • Conclusion
  • References
  • Chapter 8: Hash Functions
  • Conclusion
  • References
  • Chapter 9: Symmetric Encryption Algorithms
  • Data Encryption Standard
  • The Generation of Keys
  • Encryption and Decryption Process
  • Operation Modes for DES
  • Advanced Encryption Standard
  • Encryption and Decryption Process
  • Operation Modes for AES
  • Conclusion
  • References
  • Chapter 10: Asymmetric Encryption Schemes
  • RSA
  • ElGamal
  • Merkle-Hellman
  • The Knapsack Approach
  • Algorithms
  • Conclusion
  • References
  • Chapter 11: Signature Schemes
  • Conclusion
  • References.
  • Chapter 12: Identification Schemes
  • FFS Identification protocol
  • Conclusion
  • References
  • Chapter 13: Lattice-Based Cryptography and NTRU
  • Practical Implementation of the NTRU Library
  • Conclusion
  • References
  • Chapter 14: Advanced Encryption Schemes
  • Homomorphic Encryption
  • Searchable Encryption
  • Conclusion
  • References
  • Chapter 15: Cryptography Tools
  • CryptTool
  • OpenSSL
  • Conclusion
  • References
  • Index.