Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- concepts and needs of cryptography in java
- -to avoid misuse,unauthorized access,data theft and data deletion
- -happens because of decentralizedoperations, diverse internet and distributed systems
- -uses diphers to encrypt data, certificate to trust and signature to verify the data from tampering
- -JCA and JCE offers algorithm independence, algorithm extensibility, implementatio independence
- encryption and secret keys
- -encryption is transforming plain text into a chipher text
- -symmetric uses any of secret,shared n private key to encrypt and decrypt, uses DES algo
- -keygenerator used to create secretkeys
- -asymmetric uses different keys for encrypt and decrypt,public n private keys, uses RSA algo
- cipher class
- -DES is weak
- -AES is the strongest according to OWASP
- digital signatures
- -MITM is intercepting data flowing between user n webserver
- -provides private n public key with the data to be transmitted and the receiver will receive sender's public key to decrypt the signature
- -use signature class of java
- -use signedobject class to create authentic runtime objects
- -use sealedobject class to create object with cryptographic algorithm
- -java xml digital signature used to generate and validate xml signatures
- SSL
- -uses encryption,authentication and digital certificate
- -JSSE provides SSL implementation using encryption, server authentication and message integrity
- -supports HTTPS
- secure key management
- -poor key management includes
- -mishandling keys
- -incorrect implementation of key generation
- -confidentiality comprimise
- -unauthorized use of public and secret keys
- -comprimise of authenticity
- -key management system
- -private keys to create digital signature and public keys to verify the digital signature
- -keystore
- -used for managing and storing cryptographic keys and certificates
- -key management tool
- -keytool-generates keypairs, import digital certificates, export existing keys, create self signed certificates
- digital certificates
- -used for identifying the author and generally issued by CA
- -includes user info, user's PK, DC of CA, issue and expiry date
- -types includes-SSL certificates, code signing certificates, client certificates
- -signing jars-signing jar files and verifying jar files
- -use jarsigner
- hashing
- -use java.security.messagedigest
- -add salt to make it stronger but keep the algo safe
- java card cryptography
- -javacard.framework,javacard.security,javacard.cryptographic
- cyptho module in spring
- -provide classes for symetric encryption,key generation, password encoding
- -common classes are byteencryptor, textencryptor,
- queryableencryptor,byteskeygenerator,
- stringkeygenerator,standardpasswordencoder,
- md5passwordencoder,bcryptpasswordencoder
- -JOSE-implementing cryptography to JSON messages
- do's and dont's in cryptography
- -avoid insecure cryptographic algorithms
- -avoid using statistical PRNG, inadequate padding and insufficient key size
- -implement strong entropy
- -implement strong algorithm
- -
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement