UsefulLinks
Computer Science
Cybersecurity
Java Security
1. Introduction to Java Security
2. The Java Sandbox Architecture
3. Permissions and Security Policies
4. Java Cryptography Architecture
5. Java Cryptography Extension
6. Secure Communication
7. Authentication and Authorization
8. Secure Coding Practices
9. Modern Java Security Features
10. Security Testing and Analysis
4.
Java Cryptography Architecture
4.1.
JCA Overview
4.1.1.
Architecture Goals
4.1.1.1.
Provider Independence
4.1.1.2.
Algorithm Abstraction
4.1.1.3.
Extensibility
4.1.2.
Provider-Based Design
4.1.2.1.
Cryptographic Service Providers
4.1.2.2.
Provider Registration
4.1.2.3.
Provider Selection
4.1.3.
Engine Classes
4.1.3.1.
Service Abstraction
4.1.3.2.
Factory Pattern Usage
4.1.3.3.
Algorithm Independence
4.2.
Cryptographic Providers
4.2.1.
Built-in Providers
4.2.1.1.
SUN Provider
4.2.1.2.
SunJCE Provider
4.2.1.3.
SunRsaSign Provider
4.2.2.
Third-Party Providers
4.2.2.1.
Provider Installation
4.2.2.2.
Provider Configuration
4.2.2.3.
Provider Security Considerations
4.2.3.
Provider Management
4.2.3.1.
Provider Registration
4.2.3.2.
Provider Precedence
4.2.3.3.
Runtime Provider Selection
4.3.
Message Digests
4.3.1.
Hash Function Concepts
4.3.1.1.
One-Way Functions
4.3.1.2.
Collision Resistance
4.3.1.3.
Avalanche Effect
4.3.2.
Hash Algorithms
4.3.2.1.
MD5 Algorithm
4.3.2.2.
SHA-1 Algorithm
4.3.2.3.
SHA-2 Family
4.3.2.4.
SHA-3 Family
4.3.2.5.
Algorithm Selection Criteria
4.3.3.
MessageDigest Class
4.3.3.1.
Instance Creation
4.3.3.2.
Data Input Methods
4.3.3.3.
Digest Computation
4.3.3.4.
Reset and Reuse
4.3.4.
Hash Applications
4.3.4.1.
Data Integrity Verification
4.3.4.2.
Password Storage
4.3.4.3.
Digital Signatures
4.4.
Digital Signatures
4.4.1.
Digital Signature Concepts
4.4.1.1.
Public Key Cryptography
4.4.1.2.
Authentication and Non-repudiation
4.4.1.3.
Signature Algorithms
4.4.2.
Signature Class
4.4.2.1.
Signature Creation
4.4.2.2.
Signature Verification
4.4.2.3.
State Management
4.4.3.
Key Pair Generation
4.4.3.1.
KeyPairGenerator Class
4.4.3.2.
Algorithm Selection
4.4.3.3.
Key Size Considerations
4.4.3.4.
Random Number Generation
4.4.4.
Signature Algorithms
4.4.4.1.
RSA Signatures
4.4.4.2.
DSA Signatures
4.4.4.3.
ECDSA Signatures
4.5.
Random Number Generation
4.5.1.
SecureRandom Class
4.5.2.
Entropy Sources
4.5.3.
Algorithm Selection
4.5.4.
Seeding Strategies
Previous
3. Permissions and Security Policies
Go to top
Next
5. Java Cryptography Extension