O'Reilly logo

Special Edition Using Java™ 2 Enterprise Edition by Mark Wutka

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Exchanging Keys

In the grand scheme of things, how you manage your encryption keys and certificates is just as important as your encryption algorithm. What good is it to have a really powerful encryption algorithm if you don't protect your keys?

When you want to perform encrypted communications between two programs on a network, key management becomes crucial. It's not easy to distribute new keys to potential clients, and no two clients should know each other's keys, so each client must have a separate key. Public keys make key distribution easier because you don't have to hide the public key, but public key encryption is far slower than symmetric private key encryption. It would be nice to have the key management of public key encryption combined ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required