September 2000
Intermediate to advanced
552 pages
12h 9m
English
You've been working with the JCE since Chapter 5,"An Introduction to Cryptography." However, you haven't focused specifically on the capabilities provided by the JCE. In this chapter, you'll take a high-level view of the JCE. I'll describe its organization and capabilities and introduce any special classes and interfaces that were not covered in earlier chapters. You'll also take a look at the Cryptix JCE, another JCE implementation that is internationally available via the Web. Finally, you'll look at how cryptographic providers are developed and develop a small provider of your own.
United States export control laws restrict the exporting of certain types of cryptographic software outside ...