Java Cryptography: Tools and Techniques
Between the standard Java Runtime and the Bouncy Castle APIs there is a rich tool set of APIs to help work with the maze
147
79
5MB
English
Pages 511
Year 2023
Report DMCA / Copyright
DOWNLOAD EPUB FILE
Table of contents :
Introduction
Chapter 1: Getting Started, an Overview
Chapter 2: Block and Stream Ciphers
Chapter 3: Message Digests, MACs, HMACs, KDFs, and XOFs
Chapter 4: Authenticated Modes, Key Wrapping, and the SealedObject
Chapter 5: Password Based Key Generation and Key Splitting
Chapter 6: Signatures
Chapter 7: Key Transport, Key Agreement, and Key Exchange
Chapter 8: X.509 Certificates and Attribute Certificates
Chapter 9: Certificate Revocation and Certificate Paths
Chapter 10: Key and Certificate Storage
Chapter 11: Cryptographic Message Syntax, S/MIME, and TSP
Chapter 12: Certification Requests and Certificate Management
Chapter 13: OpenPGP
Chapter 14: Transport Layer Security
Chapter 15: The Future
Appendix A: ASN.1 and Bouncy Castle
Appendix B: The Bouncy Castle Kotlin API
Appendix C: Algorithms provided by the Bouncy Castle Providers
Acronyms and Definitions
Bibliography and Further Reading
Notes