Algorithms
One of the nice features of the provider architecture in the Security API is that it’s possible to use different cryptographic algorithms without having to rewrite your program. The SunJCE provider includes three cipher algorithms. Other providers include other algorithms; you can select one according to your needs and budget.
Table 7.1 lists cipher algorithms and the providers that support them. Table 7.2 gives details on the providers.
Name |
Provider(s) |
DES |
SunJCE, Cryptix, IAIK, JCP |
DESede (triple DES) |
SunJCE, Cryptix (DES-EDE3), IAIK (3DES), JCP |
PBEWithMD5AndDES |
SunJCE |
RSA |
Cryptix, IAIK, JSAFE |
Blowfish |
Cryptix |
IDEA |
Cryptix, IAIK, JCP |
SPEED |
Cryptix |
RC2 |
IAIK, Cryptix |
RC4 |
IAIK, Cryptix, JCP |
CAST5 |
Cryptix |
LOKI91 |
Cryptix |
SAFER |
Cryptix |
Square |
Cryptix |
Name |
Full name |
Location |
Free? |
U.S. only? |
SunJCE |
Sun JCE Security Provider v1.0 |
Yes |
Yes | |
Cryptix |
Cryptix for Java (3.0 or later) |
Yes |
No | |
IAIK |
IAIK Security Provider |
No |
No | |
JSAFE |
RSA’s Java Crypto Toolkit |
No |
Yes | |
JCP |
JCP Crypto Development Kit |
No |
No |
Get Java Cryptography now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.