O'Reilly logo

Android Application Security Essentials by Pragati Ogal Rai

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

In this chapter, we discussed the tools that application developers can use to protect the privacy of their application and user data. We discussed about random number generation for seeding, and for use as initialization vectors for crypto algorithms. Hashing techniques, such as SHA-1 and MD5, were discussed, which developers can use to store passwords. They are also ideal to compress large data into a finite and defined length. Public key cryptography for the exchange of secret keys and symmetric key algorithms, such as AES to encrypt large amounts of data, were also discussed. We also discussed stream and block ciphers and block cipher modes. Most of the algorithms have test vectors published and available online. Developers can test ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required