Skip to Main Content
Enterprise Java™ Security: Building Secure J2EE™ Applications
book

Enterprise Java™ Security: Building Secure J2EE™ Applications

by Marco Pistoia, Nataraj Nagaratnam, Larry Koved, Anthony Nadalin
February 2004
Intermediate to advanced content levelIntermediate to advanced
608 pages
15h 11m
English
Addison-Wesley Professional
Content preview from Enterprise Java™ Security: Building Secure J2EE™ Applications

Chapter 10. The Theory of Cryptography

One of the essential ingredients of e-business and enterprise computing is cryptography. Cryptography plays a critical role in J2SE and J2EE security, as Part IV of this book demonstrates.

This chapter explains the theory of cryptography that will be used in Chapters 11, 12, and 13. First, this chapter describes secret-key cryptographic systems, as they are at the heart of most cryptographic services, including bulk-data encryption, owing to their inherent performance advantage. Next is an overview of public-key encryption, which is essential for conducting e-business, particularly across public networks, because of the relative ease of distributing cryptographic keys. In Chapter 11, secret- and public-key ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Real 802.11 Security: Wi-Fi Protected Access and 802.11i

Real 802.11 Security: Wi-Fi Protected Access and 802.11i

Jon Edney, William A. Arbaugh
Malware: Fighting Malicious Code

Malware: Fighting Malicious Code

Ed Skoudis, Lenny Zeltser

Publisher Resources

ISBN: 0321118898Purchase book