Skip to Main Content
Enterprise Java™ Security: Building Secure J2EE™ Applications
book

Enterprise Java™ Security: Building Secure J2EE™ Applications

by Marco Pistoia, Nataraj Nagaratnam, Larry Koved, Anthony Nadalin
February 2004
Intermediate to advanced content levelIntermediate to advanced
608 pages
15h 11m
English
Addison-Wesley Professional
Content preview from Enterprise Java™ Security: Building Secure J2EE™ Applications

Chapter 11. The Java 2 Platform and Cryptography

From JDK V1.1 onward, Java provides general-purpose APIs and service provider interfaces (SPIs) for cryptographic functions, collectively known as Java Cryptography Architecture and Java Cryptography Extension. The JCA and JCE are based on a provider architecture that allows for multiple and interoperable cryptographic implementations.

Chapter 10 on page 343 described the sorts of problems for which cryptography can provide solutions and introduced the general concepts of secret- and public-key cryptography. In this chapter, we look in more detail at JCA and JCE and show how J2EE and J2SE applications can take advantage of the Java cryptography API.

The JCA and JCE Frameworks

The J2EE and J2SE APIs ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Real 802.11 Security: Wi-Fi Protected Access and 802.11i

Real 802.11 Security: Wi-Fi Protected Access and 802.11i

Jon Edney, William A. Arbaugh
Malware: Fighting Malicious Code

Malware: Fighting Malicious Code

Ed Skoudis, Lenny Zeltser

Publisher Resources

ISBN: 0321118898Purchase book