Friday, May 28, 2010

Java Cryptography












Table of Contents
Preface 1
1. Introduction 5
Secure Systems
Cryptography
Platform Security
Astute Inequalities
Hello, zoT1wy1njA0=!
2. Concepts 13
Confidentiality
Integrity
Authentication
Random Numbers
Algorithms
3. Architecture 24
Alphabet Soup
Concept Classes
API and SPI
Factory Methods
Standard Names
The Provider Architecture
Key Management
Summary
4. Random Numbers 32
SecureRandom
Self-Seeding
Keyboard Timing
SeederDialog
5. Key Management 40
Keys
Key Generators
Key Translators
Key Agreement
The Identity Key Management Paradigm
The KeyStore Key Management Paradigm
6. Authentication 70
Message Digests
MACs
Signatures
Certificates
7. Encryption 89
Streams and Blocks
Block Ciphers
Algorithms
javax.crypto.Cipher
Cipher's Close Relatives
Passphrase Encryption
Inside Cipher
Hybrid Systems
8. Signed Applets 119
Renegade
HotJava
Navigator
Internet Explorer
Summary
9. Writing a Provider 131
Getting Started
Adding the ElGamal Classes
ElGamal
Generating Keys
Signature
Cipher
10. SafeTalk 144
Using SafeTalk
Under the Hood
11. CipherMail 157
Using CipherMail
Under the Hood
12. Outside the Box 174
Application Design
Decompilers and Bytecode Obfuscation
Endpoint Security
File Security
Network Security
Summary
A. BigInteger 180
B. Base64 182
C. JAR 185
D. Javakey 188
E. Quick Reference 195
Colophon 247
Article: Why is Java Cryptography so Important? 248


Related books click here
Download this book click here

No comments:

Post a Comment

Related Posts with Thumbnails

Put Your Ads Here!