Key Exchange
So far, we have created our RSA private and public keys and demonstrated building a copy of the public key with two components: the exponent and the modulus. We have also demonstrated encrypting a Date
string with our copy of the public key and decrypting it with the private key. These are all the aspects of our RSA key pair that we are going to utilize; however, we will be building the copy of the private key on the Oracle database, doing our encryption there and decrypting the data with the private key on the client. To do that, we are going to need some Oracle structures.
We will define a function and a procedure in our Application Security, appsec
schema. To do this, connect to Oracle as the appsec
user and set your role to the ...
Get Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.