Chapter 6. Key Management and Digital Certificates
In Chapter 5,"Introduction to Cryptography," you learned the basics of cryptography. You saw how cryptographic algorithms use keys to convert plaintext into ciphertext. You also learned about secret- and public-key cryptography.
In this chapter, you'll cover key management, which is the heart of any cryptographic system. You'll learn how keys are securely generated, stored, and distributed. You'll also learn how the key management of the Java Security API changed from JDK 1.1 to JDK 1.2. When you finish this chapter, you'll have a solid understanding of the key management classes and interfaces of the Java Security API.
Importance of Key Management
Key management is one of the most challenging aspects ...
Get Java Security Handbook now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.