Security Home
Security Articles
Security Links
Security Books
Security Tools
Security Keywords
|
Security
Java Cryptography
|
|
See more Amazon Details
|
|
Contents Listing
Preface
1. Introduction
Secure Systems
Cryptography
Platform Security
Astute Inequalities
Hello, zoT1wy1njA0=!
2. Concepts
Confidentiality
Integrity
Authentication
Random Numbers
Algorithms
3. Architecture
Alphabet Soup
Concept Classes
API and SPI
Factory Methods
Standard Names
The Provider Architecture
Key Management
Summary
4. Random Numbers
SecureRandom
Self-Seeding
Keyboard Timing
SeederDialog
5. Key Management
Keys
Key Generators
Key Translators
Key Agreement
The Identity Key Management Paradigm
The KeyStore Key Management Paradigm
6. Authentication
Message Digests
MACs
Signatures
Certificates
7. Encryption
Streams and Blocks
Block Ciphers
Algorithms
javax.crypto.Cipher
Cipher's Close Relatives
Passphrase Encryption
Inside Cipher
Hybrid Systems
8. Signed Applets
Renegade
HotJava
Navigator
Internet Explorer
Summary
9. Writing a Provider
Getting Started
Adding the ElGamal Classes
ElGamal
Generating Keys
Signature
Cipher
10. SafeTalk
Using SafeTalk
Under the Hood
11. CipherMail
Using CipherMail
Under the Hood
12. Outside the Box
Application Design
Decompilers and Bytecode Obfuscation
Endpoint Security
File Security
Network Security
Summary
A. BigInteger
B. Base64
C. JAR
D. Javakey
E. Quick Reference
Index
|
|
Contents
View a contents listing.
Short
Short Description.
Keyword Pages
Keyword Bestsellers
Security Bestsellers The bestselling books on Amazon.
Articles
T-Mobile Hacker in Court
Linux Security Patches Issued
FBI Drops Intelligence Software
Baltimore and Earthport
Adobe Beefs Up Security
Visit our site of the month Load Testing at loadtesting.force9.co.uk
|