O'Reilly logo

J2EE™ and Beyond: Design, Develop, and Deploy World-Class Java™ Software by Art Taylor

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Package Design

JCE allows symmetric, asymmetric, block, and stream ciphers with support for secure streams and sealed objects. The API supports this set of algorithms using a relatively small set of classes. The specifics of the various algorithms are managed by providers with a default set of supported algorithms provided with the JDK (as of JDK 1.4).

To use JCE, you must understand the specific properties required by the form of encryption being used. The properties required for various implementations of JCE tend to vary depending on the algorithm being used. JCE providers are identified in the Java security properties file, usually named JAVA_HOME/jre/lib/security/java.security.

Using JCE, the process of encrypting or decrypting data is referred ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required