Summary
In this chapter, we introduced several Java approaches to secure communications between applications. We started with a brief introduction to security-related terms and followed the introduction with a more detailed discussion later.
There are two common encryption/decryption approaches that are used today. The first is symmetric key encryption, which uses a single key that is shared between the applications. This approach requires that the key be transmitted between the applications in a secure fashion.
The second approach uses asymmetric encryption. This technique uses a private and a public key. A message encrypted with one of these keys can be decrypted with the other key. Normally, the public key is distributed using a certificate from ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access