Cover for Java Cryptography Extensions

Java Cryptography Extensions

Practical Guide for Programmers

A volume in The Morgan Kaufmann Series in Data Management Systems

Book2004

Author:

Jason Weiss

Java Cryptography Extensions

Practical Guide for Programmers

A volume in The Morgan Kaufmann Series in Data Management Systems

Book2004

 

Cover for Java Cryptography Extensions

Author:

Jason Weiss

About the book

Browse this book

Book description

For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see there is now a book that can answe ... read full description

Browse content

Table of contents

Actions for selected chapters

Select all / Deselect all

  1. Full text access
  2. Book chapterAbstract only

    Chapter 1 - Understanding Java's Cryptographic Architecture

    Pages 1-28

  3. Book chapterAbstract only

    Chapter 2 - Working with Symmetric Ciphers

    Pages 29-65

  4. Book chapterAbstract only

    Chapter 3 - Working with Asymmetric Ciphers and Key Agreement Protocols

    Pages 67-99

  5. Book chapterAbstract only

    Chapter 4 - Message Digests, Message Authentication Codes, and Digital Signatures

    Pages 101-118

  6. Book chapterAbstract only

    Chapter 5 - Managing Keys and Certificates

    Pages 119-151

  7. Book chapterNo access

    Bibliography

    Pages 153-154

  8. Book chapterNo access

    Index

    Pages 155-158

About the book

Description

For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about such a critical topic. I am sure that this book will contribute greatly to the success of securing Java applications and deployments for e-business. --Anthony Nadalin, Java Security Lead Architect, IBMFor many Java developers and software engineers, cryptography is an "on-demand" programming exercise, where cryptographic concepts are shelved until the next project requires renewed focus. But considerations for cryptography must be made early on in the design process and it’s imperative that developers know what kinds of solutions exist. One of Java’s solutions to help bridge the gap between academic research and real-world problem solving comes in the form of a well-defined architecture for implementing cryptographic solutions. However, to use the architecture and its extensions, it is important to recognize the pros and cons of different cryptographic algorithms and to know how to implement various devices like key agreements, digital signatures, and message digests, to name a few.In Java Cryptography Extensions (JCE), cryptography is discussed at the level that developers need to know to work with the JCE and with their own applications but that doesn’t overwhelm by packing in details unimportant to the busy professional. The JCE is explored using numerous code examples and instructional detail, with clearly presented sections on each aspect of the Java library. An online open-source cryptography toolkit and the code for all of the examples further reinforces the concepts covered within the book. No other resource presents so concisely or effectively the exact material needed to begin utilizing the JCE.

For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about such a critical topic. I am sure that this book will contribute greatly to the success of securing Java applications and deployments for e-business. --Anthony Nadalin, Java Security Lead Architect, IBMFor many Java developers and software engineers, cryptography is an "on-demand" programming exercise, where cryptographic concepts are shelved until the next project requires renewed focus. But considerations for cryptography must be made early on in the design process and it’s imperative that developers know what kinds of solutions exist. One of Java’s solutions to help bridge the gap between academic research and real-world problem solving comes in the form of a well-defined architecture for implementing cryptographic solutions. However, to use the architecture and its extensions, it is important to recognize the pros and cons of different cryptographic algorithms and to know how to implement various devices like key agreements, digital signatures, and message digests, to name a few.In Java Cryptography Extensions (JCE), cryptography is discussed at the level that developers need to know to work with the JCE and with their own applications but that doesn’t overwhelm by packing in details unimportant to the busy professional. The JCE is explored using numerous code examples and instructional detail, with clearly presented sections on each aspect of the Java library. An online open-source cryptography toolkit and the code for all of the examples further reinforces the concepts covered within the book. No other resource presents so concisely or effectively the exact material needed to begin utilizing the JCE.

Key Features

  • Written by a seasoned veteran of both cryptography and server-side programming
  • Covers the architecture of the JCE, symmetric ciphers, asymmetric ciphers, message digests, message authentication codes, digital signatures, and managing keys and certificates
  • Written by a seasoned veteran of both cryptography and server-side programming
  • Covers the architecture of the JCE, symmetric ciphers, asymmetric ciphers, message digests, message authentication codes, digital signatures, and managing keys and certificates

Details

ISBN

978-0-12-742751-5

Language

English

Published

2004

Copyright

Copyright © 2004 Elsevier Inc. All rights reserved

Imprint

Morgan Kaufmann

Authors

Jason Weiss