Useful Links
Computer Science
Cybersecurity
Java Security
1. Introduction to Java Security
2. The Java Sandbox Architecture
3. Permissions and Security Policies
4. Java Cryptography Architecture
5. Java Cryptography Extension
6. Secure Communication
7. Authentication and Authorization
8. Secure Coding Practices
9. Modern Java Security Features
10. Security Testing and Analysis
Java Cryptography Architecture
JCA Overview
Architecture Goals
Provider Independence
Algorithm Abstraction
Extensibility
Provider-Based Design
Cryptographic Service Providers
Provider Registration
Provider Selection
Engine Classes
Service Abstraction
Factory Pattern Usage
Algorithm Independence
Cryptographic Providers
Built-in Providers
SUN Provider
SunJCE Provider
SunRsaSign Provider
Third-Party Providers
Provider Installation
Provider Configuration
Provider Security Considerations
Provider Management
Provider Registration
Provider Precedence
Runtime Provider Selection
Message Digests
Hash Function Concepts
One-Way Functions
Collision Resistance
Avalanche Effect
Hash Algorithms
MD5 Algorithm
SHA-1 Algorithm
SHA-2 Family
SHA-3 Family
Algorithm Selection Criteria
MessageDigest Class
Instance Creation
Data Input Methods
Digest Computation
Reset and Reuse
Hash Applications
Data Integrity Verification
Password Storage
Digital Signatures
Digital Signatures
Digital Signature Concepts
Public Key Cryptography
Authentication and Non-repudiation
Signature Algorithms
Signature Class
Signature Creation
Signature Verification
State Management
Key Pair Generation
KeyPairGenerator Class
Algorithm Selection
Key Size Considerations
Random Number Generation
Signature Algorithms
RSA Signatures
DSA Signatures
ECDSA Signatures
Random Number Generation
SecureRandom Class
Entropy Sources
Algorithm Selection
Seeding Strategies
Previous
3. Permissions and Security Policies
Go to top
Next
5. Java Cryptography Extension