04574nam 2200565 450 991056129500332120221120072615.01-4842-8105-510.1007/978-1-4842-8105-5(MiAaPQ)EBC6954122(Au-PeEL)EBL6954122(CKB)21522632200041(OCoLC)1311285711(OCoLC-P)1311285711(CaSebORM)9781484281055(PPN)26217345X(EXLCZ)992152263220004120221120d2022 uy 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierCryptography and cryptanalysis in Java creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10 /Stefania Loredana Nita and Marius Iulian Mihailescu[First edition].New York, NY :Apress,[2022]©20221 online resource (230 pages)Print version: Nita, Stefania Loredana Cryptography and Cryptanalysis in Java Berkeley, CA : Apress L. P.,c2022 9781484281048 Intro -- Table of Contents -- About the Authors -- About the Technical Reviewer -- Chapter 1: Introduction -- Cryptography and Cryptanalysis -- Book Structure -- Conclusion -- References -- Chapter 2: JDK 17: New Features -- Conclusion -- References -- Chapter 3: Roadmap and Vision for Jakarta EE 10 -- Conclusion -- References -- Chapter 4: Java Cryptography Architecture -- Architecture and Design Principles -- JCA Classes and Algorithms -- Algorithms and Engine Classes -- Interfaces and Main Classes -- Data Encryption -- Hash Functions -- Signatures -- Generating Signatures -- Verifying the Signature -- Conclusion -- References -- Chapter 5: Classical Cryptography -- Caesar Cipher -- Implementation -- Cryptanalysis -- Vigenère Cipher -- Implementation -- Cryptanalysis -- Hill Cipher -- Implementation -- Cryptanalysis -- Conclusion -- References -- Chapter 6: Formal Techniques for Cryptography -- Definitions -- Probabilities and Statistics -- Conditional Probability -- Random Variables -- Entropy -- A Little Algebra -- Elliptic Curves -- Conclusion -- References -- Chapter 7: Pseudorandom Number Generators -- Examples of PRNGs -- Linear Congruential PRNGs -- Blum-Blum-Shub PRNG -- Linear Circuit PRNGs -- Other PRNGs -- PRNGs Security -- Java.util.Random Class -- Conclusion -- References -- Chapter 8: Hash Functions -- Conclusion -- References -- Chapter 9: Symmetric Encryption Algorithms -- Data Encryption Standard -- The Generation of Keys -- Encryption and Decryption Process -- Operation Modes for DES -- Advanced Encryption Standard -- Encryption and Decryption Process -- Operation Modes for AES -- Conclusion -- References -- Chapter 10: Asymmetric Encryption Schemes -- RSA -- ElGamal -- Merkle-Hellman -- The Knapsack Approach -- Algorithms -- Conclusion -- References -- Chapter 11: Signature Schemes -- Conclusion -- References.Chapter 12: Identification Schemes -- FFS Identification protocol -- Conclusion -- References -- Chapter 13: Lattice-Based Cryptography and NTRU -- Practical Implementation of the NTRU Library -- Conclusion -- References -- Chapter 14: Advanced Encryption Schemes -- Homomorphic Encryption -- Searchable Encryption -- Conclusion -- References -- Chapter 15: Cryptography Tools -- CryptTool -- OpenSSL -- Conclusion -- References -- Index.Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 17 and Jakarta EE 10. It provides a robust introduction to Java 17's new features and updates, a roadmap for Jakarta EE 10 security mechanisms, a unique presentation of the "hot points" (advantages and disadvantages) from the Java Cryptography Architecture (JCA), and more.Java (Computer program language)CryptographyComputer securityData encryption (Computer science)Java (Computer program language)Cryptography.Computer security.Data encryption (Computer science)005.8Nita Stefania Loredana974205Mihailescu Marius IulianMiAaPQMiAaPQMiAaPQBOOK9910561295003321Cryptography and cryptanalysis in Java2968744UNINA