Cargando…

Cryptography and cryptanalysis in Java : creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10 /

Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 17 and Jakarta EE 10. It provides a robust introduction to Java 17's new features and updates, a roadmap for Jakarta EE 10 security mechanis...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Nita, Stefania Loredana (Autor), Mihailescu, Marius Iulian (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York : Apress, [2022]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ii 4500
001 OR_on1311285711
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 220418s2022 nyu ob 001 0 eng d
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA  |d EBLCP  |d GW5XE  |d YDX  |d OCLCO  |d YDX  |d OCLCF  |d N$T  |d K6U  |d UKAHL  |d OCLCQ 
019 |a 1311465865  |a 1311572569 
020 |a 9781484281055  |q (electronic bk.) 
020 |a 1484281055  |q (electronic bk.) 
020 |z 1484281047 
020 |z 9781484281048 
024 7 |a 10.1007/978-1-4842-8105-5  |2 doi 
029 1 |a AU@  |b 000071547491 
029 1 |a AU@  |b 000071980592 
035 |a (OCoLC)1311285711  |z (OCoLC)1311465865  |z (OCoLC)1311572569 
037 |a 9781484281055  |b O'Reilly Media 
050 4 |a QA76.73.J38 
072 7 |a COM051280  |2 bisacsh 
082 0 4 |a 005.13/3  |2 23 
049 |a UAMI 
100 1 |a Nita, Stefania Loredana,  |e author. 
245 1 0 |a Cryptography and cryptanalysis in Java :  |b creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10 /  |c Stefania Loredana Nita, Marius Iulian Mihailescu. 
264 1 |a New York :  |b Apress,  |c [2022] 
300 |a 1 online resource (230 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
520 |a Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 17 and Jakarta EE 10. It provides a robust introduction to Java 17's new features and updates, a roadmap for Jakarta EE 10 security mechanisms, a unique presentation of the "hot points" (advantages and disadvantages) from the Java Cryptography Architecture (JCA), and more. The book dives into the classical simple cryptosystems that form the basis of modern cryptography, with fully working solutions (encryption/decryption operations). Pseudo-random generators are discussed as well as real-life implementations. Hash functions are covered along with practical cryptanalysis methods and attacks, asymmetric and symmetric encryption systems, signature and identification schemes. The book wraps up with a presentation of lattice-based cryptography and the NTRU framework library. Modern encryption schemes for cloud and big data environments (homomorphic encryption and searchable encryption) also are included. After reading and using this book, you will be proficient with crypto algorithms and know how to apply them to problems you may encounter. What You Will Learn Develop programming skills for writing cryptography algorithms in Java Dive into security schemes and modules using Java Explore "good" vs "bad" cryptography based on processing execution times and reliability Play with pseudo-random generators, hash functions, etc. Leverage lattice-based cryptography methods, the NTRU framework library, and more Who This Book Is For Those who want to learn and leverage cryptography and cryptanalysis using Java. Some prior Java and/or algorithm programming exposure is highly recommended. 
505 0 |a Intro -- Table of Contents -- About the Authors -- About the Technical Reviewer -- Chapter 1: Introduction -- Cryptography and Cryptanalysis -- Book Structure -- Conclusion -- References -- Chapter 2: JDK 17: New Features -- Conclusion -- References -- Chapter 3: Roadmap and Vision for Jakarta EE 10 -- Conclusion -- References -- Chapter 4: Java Cryptography Architecture -- Architecture and Design Principles -- JCA Classes and Algorithms -- Algorithms and Engine Classes -- Interfaces and Main Classes -- Data Encryption -- Hash Functions -- Signatures -- Generating Signatures 
505 8 |a Verifying the Signature -- Conclusion -- References -- Chapter 5: Classical Cryptography -- Caesar Cipher -- Implementation -- Cryptanalysis -- Vigenère Cipher -- Implementation -- Cryptanalysis -- Hill Cipher -- Implementation -- Cryptanalysis -- Conclusion -- References -- Chapter 6: Formal Techniques for Cryptography -- Definitions -- Probabilities and Statistics -- Conditional Probability -- Random Variables -- Entropy -- A Little Algebra -- Elliptic Curves -- Conclusion -- References -- Chapter 7: Pseudorandom Number Generators -- Examples of PRNGs -- Linear Congruential PRNGs 
505 8 |a Blum-Blum-Shub PRNG -- Linear Circuit PRNGs -- Other PRNGs -- PRNGs Security -- Java.util.Random Class -- Conclusion -- References -- Chapter 8: Hash Functions -- Conclusion -- References -- Chapter 9: Symmetric Encryption Algorithms -- Data Encryption Standard -- The Generation of Keys -- Encryption and Decryption Process -- Operation Modes for DES -- Advanced Encryption Standard -- Encryption and Decryption Process -- Operation Modes for AES -- Conclusion -- References -- Chapter 10: Asymmetric Encryption Schemes -- RSA -- ElGamal -- Merkle-Hellman -- The Knapsack Approach -- Algorithms 
505 8 |a Conclusion -- References -- Chapter 11: Signature Schemes -- Conclusion -- References -- Chapter 12: Identification Schemes -- FFS Identification protocol -- Conclusion -- References -- Chapter 13: Lattice-Based Cryptography and NTRU -- Practical Implementation of the NTRU Library -- Conclusion -- References -- Chapter 14: Advanced Encryption Schemes -- Homomorphic Encryption -- Searchable Encryption -- Conclusion -- References -- Chapter 15: Cryptography Tools -- CryptTool -- OpenSSL -- Conclusion -- References -- Index 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Java (Computer program language) 
650 0 |a Cryptography. 
650 0 |a Computer security. 
650 0 |a Data encryption (Computer science) 
650 2 |a Computer Security 
650 6 |a Java (Langage de programmation) 
650 6 |a Cryptographie. 
650 6 |a Sécurité informatique. 
650 6 |a Chiffrement (Informatique) 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Cryptography.  |2 fast  |0 (OCoLC)fst00884552 
650 7 |a Data encryption (Computer science)  |2 fast  |0 (OCoLC)fst00887935 
650 7 |a Java (Computer program language)  |2 fast  |0 (OCoLC)fst00982065 
700 1 |a Mihailescu, Marius Iulian,  |e author. 
776 0 8 |i Print version:  |z 1484281047  |z 9781484281048  |w (OCoLC)1294284912 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781484281055/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH40335697 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6954122 
938 |a YBP Library Services  |b YANK  |n 17914167 
938 |a EBSCOhost  |b EBSC  |n 3267271 
994 |a 92  |b IZTAP