Key Management

To exchange data securely, you’ll need to keep track of your own private and public keys as well as the public keys of all the people with whom you wish to converse securely. What you need is something like an address book that correlates individuals to their keys and certificates. The JCA contains support for exactly this, based around the Identity and KeyStore classes. For more information about this, take a look at Chapter 5.

Get Java Cryptography now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.