Package Design

JCE allows symmetric, asymmetric, block, and stream ciphers with support for secure streams and sealed objects. The API supports this set of algorithms using a relatively small set of classes. The specifics of the various algorithms are managed by providers with a default set of supported algorithms provided with the JDK (as of JDK 1.4).

To use JCE, you must understand the specific properties required by the form of encryption being used. The properties required for various implementations of JCE tend to vary depending on the algorithm being used. JCE providers are identified in the Java security properties file, usually named JAVA_HOME/jre/lib/security/java.security.

Using JCE, the process of encrypting or decrypting data is referred ...

Get J2EE™ and Beyond: Design, Develop, and Deploy World-Class Java™ Software now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.