Java Security

  1. Java Cryptography Architecture
    1. JCA Overview
      1. Architecture Goals
        1. Provider Independence
          1. Algorithm Abstraction
            1. Extensibility
            2. Provider-Based Design
              1. Cryptographic Service Providers
                1. Provider Registration
                  1. Provider Selection
                  2. Engine Classes
                    1. Service Abstraction
                      1. Factory Pattern Usage
                        1. Algorithm Independence
                      2. Cryptographic Providers
                        1. Built-in Providers
                          1. SUN Provider
                            1. SunJCE Provider
                              1. SunRsaSign Provider
                              2. Third-Party Providers
                                1. Provider Installation
                                  1. Provider Configuration
                                    1. Provider Security Considerations
                                    2. Provider Management
                                      1. Provider Registration
                                        1. Provider Precedence
                                          1. Runtime Provider Selection
                                        2. Message Digests
                                          1. Hash Function Concepts
                                            1. One-Way Functions
                                              1. Collision Resistance
                                                1. Avalanche Effect
                                                2. Hash Algorithms
                                                  1. MD5 Algorithm
                                                    1. SHA-1 Algorithm
                                                      1. SHA-2 Family
                                                        1. SHA-3 Family
                                                          1. Algorithm Selection Criteria
                                                          2. MessageDigest Class
                                                            1. Instance Creation
                                                              1. Data Input Methods
                                                                1. Digest Computation
                                                                  1. Reset and Reuse
                                                                  2. Hash Applications
                                                                    1. Data Integrity Verification
                                                                      1. Password Storage
                                                                        1. Digital Signatures
                                                                      2. Digital Signatures
                                                                        1. Digital Signature Concepts
                                                                          1. Public Key Cryptography
                                                                            1. Authentication and Non-repudiation
                                                                              1. Signature Algorithms
                                                                              2. Signature Class
                                                                                1. Signature Creation
                                                                                  1. Signature Verification
                                                                                    1. State Management
                                                                                    2. Key Pair Generation
                                                                                      1. KeyPairGenerator Class
                                                                                        1. Algorithm Selection
                                                                                          1. Key Size Considerations
                                                                                            1. Random Number Generation
                                                                                            2. Signature Algorithms
                                                                                              1. RSA Signatures
                                                                                                1. DSA Signatures
                                                                                                  1. ECDSA Signatures
                                                                                                2. Random Number Generation
                                                                                                  1. SecureRandom Class
                                                                                                    1. Entropy Sources
                                                                                                      1. Algorithm Selection
                                                                                                        1. Seeding Strategies