Java Cryptography: Tools and Techniques

Between the standard Java Runtime and the Bouncy Castle APIs there is a rich tool set of APIs to help work with the maze

147 79 5MB

English Pages 511 Year 2023

Report DMCA / Copyright

DOWNLOAD EPUB FILE

Table of contents :
Introduction
Chapter 1: Getting Started, an Overview
Chapter 2: Block and Stream Ciphers
Chapter 3: Message Digests, MACs, HMACs, KDFs, and XOFs
Chapter 4: Authenticated Modes, Key Wrapping, and the SealedObject
Chapter 5: Password Based Key Generation and Key Splitting
Chapter 6: Signatures
Chapter 7: Key Transport, Key Agreement, and Key Exchange
Chapter 8: X.509 Certificates and Attribute Certificates
Chapter 9: Certificate Revocation and Certificate Paths
Chapter 10: Key and Certificate Storage
Chapter 11: Cryptographic Message Syntax, S/MIME, and TSP
Chapter 12: Certification Requests and Certificate Management
Chapter 13: OpenPGP
Chapter 14: Transport Layer Security
Chapter 15: The Future
Appendix A: ASN.1 and Bouncy Castle
Appendix B: The Bouncy Castle Kotlin API
Appendix C: Algorithms provided by the Bouncy Castle Providers
Acronyms and Definitions
Bibliography and Further Reading
Notes

Java Cryptography: Tools and Techniques

  • 0 0 0
  • Like this paper and download? You can publish your own PDF file online for free in a few minutes! Sign Up
Recommend Papers