O'Reilly logo

Inside Java™ 2 Platform Security: Architecture, API Design, and Implementation, Second Edition by Mary Dageforde, Gary Ellison, Li Gong

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

10.8. Algorithm Specifications

When implementing crypto algorithms, a provider should comply with existing standard specifications. Following are some of these specifications and their relationships with SDK implementations. In particular, some or all the following fields are given for each algorithm specification:

  • Name. The name by which the algorithm is known. This is the name passed to the getInstance method when requesting the algorithm and returned by the getAlgorithm method to determine the name of an existing algorithm object. These methods are in the engine classes Signature, MessageDigest, KeyPairGenerator, and AlgorithmParameterGenerator.

  • Type. The type of algorithm: Signature, MessageDigest, KeyPairGenerator, or ParameterGenerator ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required