Java Cryptography Architecture (JCA)
#3
PRESENTED BY:
Nick Pullman

[attachment=9151]
Java Cryptography
Basic Cryptographic Functions

 Private/Public Key Pair Generation
 Secret Key Generation
 Hash Functions
 Digital Signatures
 Random Number Generation
 Encryption/Decryption
Java Cryptographic Overview
 Java cryptography uses 2 main APIs
• Java Cryptographic Architecture (JCA)
• Java Cryptographic Extensions (JCE)
 Robust and Extensible
 Platform independent
 Interoperable among vendor implementations
Java Cryptographic Architecture
 JCA/JCE define the types and functionalities of different cryptographic services
 The actual cryptographic implementation is done by service providers
 JCA/JCE is made up of mostly “engine” classes which provide a standard interface into the service providers
 This makes the overall implementation extensible since new service providers can be “plugged in”
JCA Overview
 Core classes and interfaces related to Java cryptography
 Contains 2 provider classes that are used to manage and maintain the service providers
• Provider: class that represents a cryptographic service provider
• Security: class that manages the installed providers and their security properties
 Contains a number of engine classes which are used to interface with cryptographic services
JCA Classes
 MessageDigest: used to implement one-way hash functions such as MD5 or SHA
 Signature: used to implement digital signatures
 KeyPairGenerator: used to create public/private key pairs for different algorithms
 KeyFactory: used to convert keys into key specifications and then vice-versa
 CertificateFactory: used to generate certificates
 KeyStore: used to create a keystore which maintains keys and certificates in memory for later usage
 AlgorithmParameters: used to maintain the security parameters for specific algorithms
 AlgorithmParameterGenerator: used to create a set of parameters to be used for specific algorithms
 SecureRandom: used to create random or pseudo-random numbers
JCA Examples
 Create Message Digest
• byte[] dataBytes = “This is test data”.getBytes(); MessageDigest md = MessageDigest.getInstance("SHA1"); md.update(dataBytes); byte[] digest = md.digest();
 First, the test data is populated.
 Second, a concrete message digest object is created with SHA1 as the cryptographic algorithm
 Third, the message digest object is updated; i.e. the digest is updated using the current bytes
 Finally, the digest method completes the algorithm
 Create Keystore
• KeyStore ks = KeyStore.getInstance("JCEKS"); ks.load(null,password.toCharArray());
java.io.FileOutputStream fos = new java.io.FileOutputStream(keyFilePath);
ks.store(fos, password.toCharArray());
fos.close();
 First, create the concrete KeyStore object.
 Second, load “ks” with a null input
 Third, create the output stream to save the file.
 Fourth, the store method saves the KeyStore to the file specified and protects it with the password
 Finally, close the output stream.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: abstract on java cryptography, java cryptography seminar, java cryptography architecture tutorial, java cryptography architecture abstract, java project report on cryptography, seminar report on jca, java cryptography architecture download,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: Java Cryptography Architecture (JCA) - by seminar class - 26-02-2011, 10:48 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  cryptography and network security full report computer science technology 21 31,573 31-05-2016, 12:17 PM
Last Post: dhanabhagya
  Cryptography and Network Security seminar surveyer 5 4,649 08-08-2011, 09:59 AM
Last Post: seminar addict
  The Common Component Architecture seminar class 1 1,351 23-04-2011, 12:45 PM
Last Post: seminar class
  Cryptography: Securing the Information Age seminar class 0 1,986 23-03-2011, 11:24 AM
Last Post: seminar class
  Exploring Hierarchy Architecture for Wireless Sensor Networks Management project report helper 0 1,270 18-10-2010, 05:20 PM
Last Post: project report helper
  Composition of Java-based Router Elements and its Application to Generalized Video computer science topics 0 1,492 17-06-2010, 01:18 PM
Last Post: computer science topics
  JHDL (Java Hardware Description Language) computer science crazy 1 2,471 20-02-2010, 08:15 PM
Last Post: shankar.legend
  Cognitive architecture computer science crazy 0 1,145 03-09-2009, 05:22 PM
Last Post: computer science crazy

Forum Jump: