Normal view MARC view ISBD view

Java cryptography / Jonathan Knudsen

Auteur principal : Knudsen, Jonathan, AuteurType de document : MonographieCollection : The Java seriesLangue : anglais.Pays : Etats Unis.Éditeur : Boston : O'Reilly, 1998Description : 1 vol. (xvi-344 p.) : ill. ; 24 cmISBN : 1565924029.Bibliographie : Bibliogr. p. 279-327. Index.Sujet MSC : 68N15, Computer science -- Software, Programming languages
68M10, Computer science -- Computer system organization, Network design and communication
68P25, Computer science -- Theory of data, Data encryption
Tags from this library: No tags from this library for this title. Log in to add tags.
Current location Call number Status Date due Barcode
CMI
Salle E
Info KNU (Browse shelf) Available 02282-01

Chapter 1, Introduction, describes cryptography's role in secure systems development and introduces some short examples of cryptographic programming. Chapter 2, Concepts, introduces the fundamental concepts of cryptography: ciphers, message digests, signatures, and random numbers. Chapter 3, Architecture, presents a bird's-eye view of Java cryptographic software packages and introduces the Provider Architecture that underlies the Java Security API. Chapter 4, Random Numbers, describes cryptographic random numbers in Java. Chapter 5, Key Management, describes the key management classes that are included with the JDK. Chapter 6, Authentication, shows how to use message digests, signatures, and certificates for authentication. Chapter 7, Encryption, covers encryption: symmetric and asymmetric ciphers, cipher modes, and hybrid systems. Chapter 8, Signed Applets, describes how to create signed applets. Chapter 9, Writing a Provider, describes how to write a security provider. It includes classes that implement the ElGamal cipher and signature algorithms. Chapter 10, SafeTalk, presents a completely functional application, a cryptographically enabled network talk application. Chapter 11, CipherMail, includes another complete application, a cryptographically enabled email client. Chapter 12, Outside the Box, talks about noncryptographic security issues you should know about. Appendix A, BigInteger, discusses the BigInteger class, which is useful for implementing the mathematics of cryptographic algorithms. Appendix B, Base64, presents classes for base64 conversion. Appendix C, JAR, describes the jar archiving tool, which is used to bundle up Java applets and applications. Appendix D, Javakey, includes a description of the JDK 1.1 javakey tool, which is used to manage a database of keys and certificates. Appendix E, Quick Reference, contains a quick reference listing of the cryptographic classes covered in this book.

Bibliogr. p. 279-327. Index

There are no comments for this item.

Log in to your account to post a comment.