O'Reilly logo

J2EE™ and Beyond: Design, Develop, and Deploy World-Class Java™ Software by Art Taylor

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

JCE Example

A common implementation of secret key cryptography is application password encryption and decryption. There are two problems often associated with secret key or asymmetric cryptography. One is the requirement that both encryption and decryption require the same key, so the receiver of an encrypted document must somehow be given the key of the party that encrypted the document. The other is that if an unauthorized third party were to obtain access to the secret key, he or she could decrypt the messages or impersonate the sender and encrypt messages, so the physical security of the secret key is important.

Password encryption applications are a good fit for secret key encryption because they usually reside on only a few servers, which ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required