Home Page Javascript Download Core Servlets & Java Server Java Cryptography Java in 60 Min A Day Javascript Tutorial About Us Contact Us
Site Search
Free Javascript Lessons
Newest Java Articles
Checkbox Changer
Check Entry
Check All
Block Key Press
Basic Validation
Auto Email Link
JavaScript Forms: Agree Before Entry
Auto Tab
JavaScript Calendars: Time Entered - Day Highlighted
JavaScript Calendars: Days Left
Related SE Keywords
Java virtual machine
Java Applet
Javascript Lesson
Javascript Tutorial
Java Programming
Java Games
Java Xml
Java String
Cryptography Extensions
Free Web Master Tools
 
JavascriptDownload.net > Free Javascript Lessons > Java Cryptography Extensions / Contents

2.3     The KeyGenerator Engine  33
2.3.1  Algorithm Independent Initialization  34
2.3.2  Algorithm Specific Initialization 35
2.3.3  Obtaining the Symmetric Cipher Key via SecretKeyClass 35

2.4     Avoiding Opaque Keys 36
2.4.1
    
Code Example: Converting a Key into a Key Specification. Option 1   36
2.4.2
    
Code Example: Converting a Key into a Key Specification, Option 2  39

2.5     Categorizing Symmetric Ciphers  40
2.5.1
    
Key Management  41
2.5.2     Non-Repudiation 41
2.5.3     Data Integrity 42

2.6     Padding and Cipher Modes 42
2.6.1
    
Padding  43
2.6.2     Cipher Modes 44

2.7     The Cipher Engine 46
2.7.1
    
Initializing the Engine 48
2.7.2     Code Example: Block Cipher Encryption  49
2.7.3     Code Example: Secure Streaming Cipher Encryption   52

2.7.4     Code Example: Secure Streaming Cipher Decryption   55

2.8     Password Based Encryption  59
2.8.1  Code Example: Password Based Encryption with a Message Digest and an Encryption Algorithm  60

2.9     Bringing Order to Chaos: Picking a Cipher 64
2.9.1
    
DES 64
2.9.2
    
DEScde a.k.a. TripleDES 64
2.9.3
    
Advanced Encryption Standard (AES) 64
2.9.4
    
Blowfish 65

 

3   Working with Asymmetric Ciphers and Key Agreement Protocols 67

3.1     The KeyPairGenerator Engine 69
3.1.1     Code Example: Algorithm Independent Key Pair Generation  69
3.1.2     Comparing Symmetric and Asymmetric Keys  71
3.1.3     Persisting a Key: Key Encodings Defined  72
3.1.4     Code Example: Inspecting Key Encodings 72

   Contents        IX

        3.1.5     Code Example: Loading an X.509 Encoded Public Key from Disk  75

        3.1.6     Code Example: Loading a PKCS#8 Encoded Private Key from Disk  76

                3.2      Revisiting the Cipher Engine   78

        3.2.1     Code Example: Encrypting a File with a Public Key  78

        3.2.2     Code Example: Decrypting a File with a Private Key  81

 

                3.3           Comparing Keys for Equality  84

        3.4           Looking to the Future: Elliptic Curve Cryptography 84 
        3.4
.1 Asymmetric Cipher Wrap-up  85

                3.5           The KeyAgreenenl Engine  85

        3.5.1 Code Example: Key Exchange to Establish a Secure Channel 86

 

               4    Message Digests, Message Authentication Codes, and Digital Signatures   101

               4.1      Choosing a Message Digest Algorithm   102

       4.1.1      An Overview of an MD5   102

       4.1.2      An Overview of SUA 1   103

       4.1.3      An Overview of RIPEMD  103

               4.2      The MessageDigest Engine   103

       4.2.1      Code Example: Generating a Message Digest   103

       4.2.2      Message Digest Performance   106

       4.2.3      Understanding Message Digest Shortcomings   107

               4.3      The Mac Engine  107

       4.3.1      Code Example Generating a Hashed MAC Digest   108

       4.3.2      Understanding MAC Shortcomings   110

 

               4.4            Digital Signatures   111

               4.5            The Signature Engine  113

 

       4.5.1     Code Example: Generating a Digital Signature Using a Private Key   113

       4.5.2     Code Example: Verifying a Digital Signature Using a Public Key   115

 

                    5    Managing Keys and Certificates   119

               5.1           The Need for Key Management   119

               5.2           Digital Certificates Defined   120

       5.3           The KeyStore Engine   121 
       5.3-1   The keytool Utility  124

 

           X        Contenis


           5.3.2       Code Example: Storage of a Symmetric Cipher Key  127

           5.3.3       Code Example: Retrieving a Symmetric Cipher Key   130

           5.3.4       A Word on Key Store Password Management   132

                   5.4       The CertificateFactory Engine  132

           5.4.1       Process for Requesting a Certificate Signed by a CA   136

           5.4.2       Certificate Revocation List (CRL)   137

           5.4.3       Code Example: Encryption with a Digital Certificate   139

           5.4.4       Code Example: Decryption with a Private Key   142

           5.4.5       RSA Encryption Limitations   14S

           5.4.6       Code Example: Combining RSA with a Secret Key  14S

                   5.5       Conclusion   150
                              Bibliography  153
                              Index   155

Add Comment
 
homepage   |  about us  |  contact us
Powered By teknonova.com Sunucu Kiralama