Java cryptography / Jonathan KnudsenType de document : MonographieCollection : The Java seriesLangue : anglais.Pays: Etats Unis.Éditeur : Boston : O'Reilly, 1998Description : 1 vol. (xvi-344 p.) : ill. ; 24 cmISBN: 1565924029.Bibliographie : Bibliogr. p. 279-327. Index.Sujet MSC : 68N15, Computer science - Theory of software, Theory of programming languages
68M10, Computer system organization, Network design and communication
68P25, Computer science - Theory of data, Data encryption Item type: Monographie
|Current library||Call number||Status||Date due||Barcode|
|CMI Salle E||Info KNU (Browse shelf(Opens below))||Available||02282-01|
Chapter 1, Introduction, describes cryptography's role in secure systems development and introduces some short examples of cryptographic programming. Chapter 2, Concepts, introduces the fundamental concepts of cryptography: ciphers, message digests, signatures, and random numbers. Chapter 3, Architecture, presents a bird's-eye view of Java cryptographic software packages and introduces the Provider Architecture that underlies the Java Security API. Chapter 4, Random Numbers, describes cryptographic random numbers in Java. Chapter 5, Key Management, describes the key management classes that are included with the JDK. Chapter 6, Authentication, shows how to use message digests, signatures, and certificates for authentication. Chapter 7, Encryption, covers encryption: symmetric and asymmetric ciphers, cipher modes, and hybrid systems. Chapter 8, Signed Applets, describes how to create signed applets. Chapter 9, Writing a Provider, describes how to write a security provider. It includes classes that implement the ElGamal cipher and signature algorithms. Chapter 10, SafeTalk, presents a completely functional application, a cryptographically enabled network talk application. Chapter 11, CipherMail, includes another complete application, a cryptographically enabled email client. Chapter 12, Outside the Box, talks about noncryptographic security issues you should know about. Appendix A, BigInteger, discusses the BigInteger class, which is useful for implementing the mathematics of cryptographic algorithms. Appendix B, Base64, presents classes for base64 conversion. Appendix C, JAR, describes the jar archiving tool, which is used to bundle up Java applets and applications. Appendix D, Javakey, includes a description of the JDK 1.1 javakey tool, which is used to manage a database of keys and certificates. Appendix E, Quick Reference, contains a quick reference listing of the cryptographic classes covered in this book.
Bibliogr. p. 279-327. Index