Chapter 20. The J2ME Crypto Recipes

CHAPTER OVERVIEW

  • Symmetric Encryption

  • Password-Based Encryption

  • Public Key Encryption

  • Digital Signature

  • The Bouncy Castle API

  • The IAIK JCE ME API

  • The Phaos Micro Foundation API

  • NTRU jNeo API

In the previous chapter, we reviewed leading cryptography libraries for J2ME. In this chapter, we use code examples to show how to perform various common cryptographic tasks using those libraries.

Overview of Recipes

The sample applications in this chapter provide ready-to-use code snippets for symmetric key encryption, password-based encryption, public key encryption, and digital signature tasks. You can use them in your custom J2ME applications. Brief descriptions of those common tasks are given in Table 20.1. For detailed discussions ...

Get Enterprise J2ME™: Developing Mobile Java™ Applications now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.