Beginning Cryptography with JavaJohn Wiley & Sons, 19.08.2005 г. - 480 страници Beginning Cryptography with Java While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how. This book teaches you how. Chapters one through five cover the architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN.1 packages, all with plenty of examples. Building on that foundation, the second half of the book takes you into higher-level topics, enabling you to create and implement secure Java applications and make use of standard protocols such as CMS, SSL, and S/MIME. What you will learn from this book
Who this book is for This book is for Java developers who want to use cryptography in their applications or to understand how cryptography is being used in Java applications. Knowledge of the Java language is necessary, but you need not be familiar with any of the APIs discussed. Wrox Beginning guides are crafted to make learning programming languages and technologies easier than you think, providing a structured, tutorial format that will guide you through all the techniques involved. |
Съдържание
The Keytool | 304 |
Jarsigning and Java Policy | 312 |
Data Compression in | 345 |
SMIME Enveloped Messages | 354 |
SMIME Compressed Messages | 361 |
SSL and | 365 |
TrustManagerFactory getAlgorithm TrustManagerFactory getDefaultAlgorithm TrustManagerFactory getTrustManagers Managing SSL Session Info... | 389 |
Summary | 401 |
Asymmetric Key Cryptography | 83 |
Object Description in Cryptography Using ASN 1 | 135 |
Basic ASN 1 Syntax | 136 |
Encoding Rules | 150 |
Some Real Examples | 164 |
Summary | 181 |
Distinguished Names and Certificates | 183 |
Certificate Revocation and Path Validation | 227 |
X509CRLSelector addIssuer and X509CRLSelector addIssuerName X509CRLSelector setDateAndTime X509CRLSelector setMaxCRL and X509CR... | 248 |
Key and Certificate Management Using Keystores | 281 |
KeyStore setCertificateEntry KeyStore setKeyEntry KeyStore size KeyStore store KeyStore Nested Classes and Interfaces | 290 |
The PKCS 12 Format | 298 |
Exercises | 403 |
Algorithms Provided by the Bouncy Castle Provider | 417 |
Bibliography and Further Reading | 425 |
184 | 426 |
X509CRL verify X509CRL getEncoded The X509CRLEntry Class | 431 |
187 | 433 |
60 | 434 |
257 | 437 |
327 | 439 |
62 | 440 |
365 | 441 |