O'Reilly logo

Enterprise J2ME™: Developing Mobile Java™ Applications by Michael Juntao Yuan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 20. The J2ME Crypto Recipes

CHAPTER OVERVIEW

  • Symmetric Encryption

  • Password-Based Encryption

  • Public Key Encryption

  • Digital Signature

  • The Bouncy Castle API

  • The IAIK JCE ME API

  • The Phaos Micro Foundation API

  • NTRU jNeo API

In the previous chapter, we reviewed leading cryptography libraries for J2ME. In this chapter, we use code examples to show how to perform various common cryptographic tasks using those libraries.

Overview of Recipes

The sample applications in this chapter provide ready-to-use code snippets for symmetric key encryption, password-based encryption, public key encryption, and digital signature tasks. You can use them in your custom J2ME applications. Brief descriptions of those common tasks are given in Table 20.1. For detailed discussions ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required