Enterprise Java™ Security: Building Secure J2EE™ Applications
by Marco Pistoia, Nataraj Nagaratnam, Larry Koved, Anthony Nadalin
Chapter 12. PKCS and S/MIME in J2EE
Public-Key cryptography is seeing wide application and acceptance in e-business applications. One thing is increasingly clear: If public-key cryptography is to be effective in e-business, standards must be interoperable. Even though vendors may agree on the basic public-key algorithms and protocols, compatibility between implementations is not guaranteed. Interoperability requires strict adherence to an agreed-on standard format for transferred data. The Public-Key Cryptography Standards provide such a basis for interoperability.
These PKCS standards include both algorithm-specific and algorithm-independent implementation standards. Two of the many algorithms supported are Rivest-Shamir-Adleman (see Section 10.3.1.1 ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access