Skip to Main Content
Hack Proofing Your Web Applications
book

Hack Proofing Your Web Applications

by Syngress
June 2001
Intermediate to advanced content levelIntermediate to advanced
512 pages
18h 49m
English
Syngress
Content preview from Hack Proofing Your Web Applications
318 Chapter 7 • Securing Your Java Code
The important part about encryption is not keeping the algorithm
private. Most algorithms used for encrypting a message are well known,
and explanations are available in literature and on the Internet.The
important part is that it cannot be reversed without knowing the key,
and also that the key is large enough that it is not susceptible to brute
force attacks.With the Roman example of encryption given above,after
we know the encryption algorithm it is quite basic to decrypt the mes-
sage.With DES, knowing the algorithm does not really help to
unscramble a message.To do that we must obtain the key.
There are actually ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Developer's Guide to Web Application Security

Developer's Guide to Web Application Security

Michael Cross
The CERT® Oracle® Secure Coding Standard for Java™

The CERT® Oracle® Secure Coding Standard for Java™

Fred Long, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, David Svoboda
Troubleshooting CentOS

Troubleshooting CentOS

Jonathan Hobson

Publisher Resources

ISBN: 9781928994312