September 2000
Intermediate to advanced
552 pages
12h 9m
English
In Chapter 5,"Introduction to Cryptography," you learned the basics of cryptography. You saw how cryptographic algorithms use keys to convert plaintext into ciphertext. You also learned about secret- and public-key cryptography.
In this chapter, you'll cover key management, which is the heart of any cryptographic system. You'll learn how keys are securely generated, stored, and distributed. You'll also learn how the key management of the Java Security API changed from JDK 1.1 to JDK 1.2. When you finish this chapter, you'll have a solid understanding of the key management classes and interfaces of the Java Security API.
Key management is one of the most challenging aspects ...