√лавна€    Ex Libris     ниги    ∆урналы    —татьи    —ерии     аталог    Wanted    «агрузка    ’удЋит    —правка    ѕоиск по индексам    ѕоиск    ‘орум   
blank
јвторизаци€

       
blank
ѕоиск по указател€м

blank
blank
blank
 расота
blank
Weiss J. Ч Java Cryptography Extensions: Practical Guide for Programmers
Weiss J. Ч Java Cryptography Extensions: Practical Guide for Programmers

„итать книгу
бесплатно

—качать книгу с нашего сайта нельз€

ќбсудите книгу на научном форуме



Ќашли опечатку?
¬ыделите ее мышкой и нажмите Ctrl+Enter


Ќазвание: Java Cryptography Extensions: Practical Guide for Programmers

јвтор: Weiss J.

јннотаци€:

Provides tools to work with the JCE and the ablility to write programs in Java right away, in addition to providing details necessary for successful cryptography solutions in Java.


язык: en

–убрика: –уководства по программному обеспечению/

—татус предметного указател€: √отов указатель с номерами страниц

ed2k: ed2k stats

»здание: 1 edition

√од издани€: 2004

 оличество страниц: 176

ƒобавлена в каталог: 31.10.2010

ќперации: ѕоложить на полку | —копировать ссылку дл€ форума | —копировать ID
blank
ѕредметный указатель
-certreq      136
-genkey      136
.csr extension      136
addProvider()      14
Advanced Encryption Standard (AES)      64
AES      64
Algorithm extensibility      5
Algorithm independence      5
Algorithm independent initialization      34Ч35
Algorithm independent key pair generation      69Ч71
Algorithm specific initialization      35
AlgorithmParameterGenerator      5
AlgorithmParameters      5
Art of Computer Programming, Volume 2, The (Knuth)      32
Asymmetric ciphers      67Ч85
Asymmetric ciphers, Cipher engine      78
Asymmetric ciphers, decrypting file with private key      81Ч84
Asymmetric ciphers, ECC      84Ч85
Asymmetric ciphers, encrypting file with public key      78Ч81
Asymmetric ciphers, key encodings      72Ч75
Asymmetric ciphers, key equality      84
Asymmetric ciphers, KeyPairGenerator engine      69Ч71
Asymmetric ciphers, public/private keys      67
Asymmetric ciphers, symmetric ciphers, contrasted      71
Base64 encoding      4 132 134Ч136
BKS      122 128
Block cipher encryption      49Ч52
Block ciphers      40 41
Blowfish      65
Bouncy Castle      7
CA      120
CBC      44Ч45
Certificate authority (CA)      120
Certificate Revocation List (CRL)      137Ч139
CertificateFactory engine      132Ч150
CertificateFactory engine, combining RSA with secret key      145Ч150
CertificateFactory engine, CRL      137Ч139
CertificateFactory engine, description with private key      142Ч145
CertificateFactory engine, encryption from digital certificate      139Ч142
CertificateFactory engine, reading Base      64
CertificateFactory engine, reading DER encoded certificate      132Ч134
CertificateFactory engine, requesting CA signed certificate      136Ч137
CertificateFactory engine, RSA encryption limitations      145
CertPathBuilder      5
CERTSTORE      5
CFB      45Ч46
Chinese remainder theorem      71
Cipher      29
Cipher Block Chaining (CBC)      44Ч45
Cipher engine      46Ч48 78
Cipher factory method      46Ч48
Cipher FeedBack Mode (CFB)      45Ч46
Cipher modes      44Ч46
Ciphertext      29
class loaders      11
Code      29
Code examples, algorithm independent key pair generation      69Ч71
Code examples, Base64 encoded certificate      134Ч136
Code examples, block cipher encryption      49Ч52
Code examples, combining RSA with secret key      145Ч150
Code examples, convert key to key specification      36Ч40
Code examples, creating new key store      123Ч124
Code examples, decryption with private key      81Ч84 142Ч145
Code examples, DER encoded certificate      132Ч134
Code examples, digital signature      113Ч118
Code examples, download instructions      151
Code examples, encryption with digital certificate      139Ч142
Code examples, encryption with public key      78Ч81
Code examples, hashed MAC digest      108Ч110
Code examples, inspecting key encodings      72Ч75
Code examples, key exchange to establish secure channel      86Ч99
Code examples, list of installed algorithms      22Ч27
Code examples, list of installed providers      15Ч19
Code examples, list of providerТs supported algorithms      19Ч22
Code examples, listing key store contents      126Ч127
Code examples, loading PKCS#8 encoded private key      76Ч78
Code examples, loading X.509 encoded public key      75Ч76
Code examples, message digest      103Ч106
Code examples, password based encryption      60Ч63
Code examples, processing CRL from CA      137Ч138
Code examples, random number generation      32Ч33
Code examples, retrieving symmetric cipher key      130Ч132
Code examples, secure screaming cipher decryption      55Ч59
Code examples, secure screaming cipher encryption      52Ч55
Code examples, simple encryption operation      1Ч2
Code examples, storage of symmetric cipher key      127Ч130
Combining RSA with secret key      145Ч150
Convert key to key specification      36Ч40
CRL      137Ч139
Cryptix      7
cryptographic hashing      101
Cryptographic Service Providers      see Providers
Cryptographically secure pseudo-random number generator (CSPRNG)      30Ч32
Cryptography      1 3Ч4
CSPRNG      30Ч32 110
Data integrity      42
Decryption with private key      81Ч84 142Ч145
Der      132
DER encoded certificate      132Ч134
DES      38 64
DESede      64
developer      5
DH      86
dictionary attack      60
Diffie Ч Hellman (DH)      86
Digital certificate      120
Digital signature      111Ч118
Digital Signature Algorithm (DSA)      112
Digital Signature Law Survey      111
Digital Signature Standard (DSS)      112
Distinguished encoding rule (DER)      132
DSA      112
DSS      112
Dual keys      38
Dynamic provider registration      11Ч13
ECB      44
ECC      84Ч85
ECDLP      84
Electronic codebook mode (ECB)      44
Elliptic curve cryptography (ECC)      84Ч85
Elliptic curve discrete logarithm problem (ECDLP)      84
encoded certificate      134Ч136
Encryption      1
Encryption with digital certificate      139Ч142
Encryption with public key      78Ч81
Engine      5
Engine classes      3
Establishing a seed value      31
examples      see Code examples
Exporting digital certificates      132 133
Factory design pattern      5
factory methods      9
generateCRL()      139
generateKey()      36
getAlgorithm()      35
getDefaultType()      122
getEncoded()      35
getFormat()      35
getProviders()      14
Hashed MAC digest      108Ч110
Hashing      101
Hello/Bye Ч Bye handshaking protocol      86
helper classes      13Ч14
HMAC      109
HMACMD      5 110
HMACSHA1      110
Horton principle      111
IFP      71
Illustrative code      see Code examples
Implementation independence      5
Implementation interoperability      7
Initialization Vector (IV)      45
insertProviderAt()      14
Installing providers      9Ч13
Integer factorization problem (IFP)      71
isKeyEntry()      127
isRevoked()      139
Iteration count      60
IV      45
Java Cryptography Architecture (JCA)      4Ч7
Java Cryptography Extension (JCE)      7Ч8
Java extensions      11
java.security.Provider      14
java.security.Security      13Ч14
java.util.arrays      84
javap      21
JCA      4Ч7
JCA engines      5
JCA helper classes      13Ч14
JCE      7Ч8
JCE engines      7
JCEKS      122
jceRSAcert      132
JKS      122
Jurisdiction policy files      27Ч28
KerckhoffТs principle[      25 30
Key agreement protocols      67
Key encodings      72Ч75
Key equality      84
Key exchange to establish secure channel      86Ч99
Key interface      35
key management      41 119Ч120
Key pair      67
Key space      30
Key specification      36Ч40
Key store password management      132
KeyAgreement engine      85Ч89
KeyFactory      5
KeyGenerator engine      33Ч35
KeyPairGenerator engine      69Ч71
KeyStore engine      121Ч132
Keystore.BouncyCastle      122
Keystream generator      41
keytool      124Ч127 136
MAC      107Ч111
Man in the Middle attack      86 107
Mask generation function      43
MD2      102
MD4      102
MD5      102
Message authentication code (MAC)      107Ч111
Message digest      102
Message digest, JCA engine      103Ч107
Message digest, MD5      102
Message digest, performance      106Ч107
Message digest, RIPEMD      103
Message digest, SHA      1 103
Message digest, shortcomings      107
MessageDigest engine      103Ч107
non-repudiation      41Ч42
OAEP      43
OCSP      139
one time pad      41
One-way hash function      101Ч102
Online Certificate Status Protocol (OCSP)      139
Opaque algorithm strategy      9 15
Opaque keys      36
Optimal Asymmetric Encryption Padding (OAEP)      43
padding      43Ч44
Password      30
Password based encryption (PBE)      59Ч63
PBE      59Ч63
PKCS      43
PKCS #5      43
PKCS#8      72
PKCS#8 encoded private key      76Ч78
PKCS#8 EncodeKeySpec      74
PKCS12      122
PKCS5Padding      43
PKI      119
Plaintext      29
Practical Cryptography (Ferguson/Schneier)      71
Private key      67
Programming examples      see Code examples
Provider      4Ч5
Provider class      14
Provider, dynamic registration      11Ч13
Provider, installation      9Ч13
Provider, static registration      10Ч11
Public key      67
Public key cryptography      67
Public key infrastructure (PKI)      119
random number generation      30Ч31 32Ч33
Retrieving symmetric cipher key      130Ч132
revoked certificates      137
RIPEMD      103
RIPEMD128      103
RIPEMD160      103
RSA      112
RSA encryption limitations      145
RSAPrivateKey      145
Salt      60
Sample code      see Code examples
Schneier, Bruce      65 101
Secret key      29 30
SecretKey      35
SecretKeyFactory      7
Secure Hash Algorithm 1 (SHA-1)      103
Secure screaming cipher decryption      55Ч59
Secure screaming cipher encryption      52Ч55
SecureRandom engine      31Ч33
Security class      13Ч14
Service Provider Interface (SPI) architecture      8Ч9
SHA-1      103
Signature engine      113Ч118
Signature factory method      19 22
SPI architecture      8Ч9
SSL3Padding      43
Standard pair of engine factory methods      9
Static provider registration      10Ч11
Storage of symmetric cipher key      127Ч130
Stream cipher      40Ч41
String naming convention      22
String object      59
Sun JRE      6
Symmetric cipher      29Ч65 71 92
Symmetric cipher, block ciphers      40 41
Symmetric cipher, Cipher engine      46Ч48
Symmetric cipher, cipher modes      44Ч46
Symmetric cipher, converting key to key specification      36Ч40
Symmetric cipher, data integrity      42
Symmetric cipher, defined      29
Symmetric cipher, key management      41
Symmetric cipher, KeyGenerator engine      33Ч35
Symmetric cipher, list of ciphers      64Ч65
Symmetric cipher, non-repudiation      41Ч42
Symmetric cipher, opaque keys      36
Symmetric cipher, padding      43Ч44
Symmetric cipher, password based encryption      59Ч63
Symmetric cipher, random number generation      30Ч31
Symmetric cipher, SecureRandom engine      31Ч33
Symmetric cipher, streaming ciphers      40Ч41
Symmetric cipher, uses      30
Thawte      120
Third party providers      6Ч7
timestamp      111
Transparent algorithm strategy      9
Transparent key      74
TripleDES      64
Trusted certificate      120
1 2
blank
–еклама
blank
blank
HR
@Mail.ru
       © Ёлектронна€ библиотека попечительского совета мехмата ћ√”, 2004-2019
Ёлектронна€ библиотека мехмата ћ√” | Valid HTML 4.01! | Valid CSS! ќ проекте