Chapter Review
We find ourselves at the end of another chapter. Looking back, let's see what ground we've covered.
- We learned about DES secret password encryption. In particular, we learned about the various artifacts that make up the secret password key: passphrase, salt, iteration count, and the algorithm. We also devised a way to observe and report and work around a bug in JCE, even coding to accommodate an eventual JVM upgrade that will not have the bug.
- We found out how to generate the secret password key on Oracle, do key exchange, then build an identical key on the client. With identical keys (a shared password), we can exchange encrypted data. We also saw how to use the RSA public key to encrypt the DES key so that we can exchange it ...
Get Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.