Exchanging Keys

In the grand scheme of things, how you manage your encryption keys and certificates is just as important as your encryption algorithm. What good is it to have a really powerful encryption algorithm if you don't protect your keys?

When you want to perform encrypted communications between two programs on a network, key management becomes crucial. It's not easy to distribute new keys to potential clients, and no two clients should know each other's keys, so each client must have a separate key. Public keys make key distribution easier because you don't have to hide the public key, but public key encryption is far slower than symmetric private key encryption. It would be nice to have the key management of public key encryption combined ...

Get Special Edition Using Java™ 2 Enterprise Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.