Java Cryptography: Tools and Techniques (The Book + Code Samples)
Java Cryptography: Tools and Techniques
About the Book
Cryptography is about the security of communications. It provides mechanisms for hiding messages from outside observers, accurately identifying the originators of messages, determining that messages have been delivered safely without tampering, and making it possible to accurately identify both the entities receiving and sending messages when messages are being delivered between different parties.
Over time, in our increasingly connected world, issues related to cryptography and security have increasingly become common in the development of applications and even other APIs. In this environment, Java still maintains its popularity as a language for the development and implementation of Internet applications. While Java has an established API for basic cryptography defined as part of the regular Java runtime, many things that developers generally need to do, such as producing and managing certificates, client credentials, time stamps, and secure messaging are not provided. The Legion of the Bouncy Castle Cryptography APIs were developed to fill a large part of this gap. That said, there is an awful lot to know, and many developers do not get the time to take a sabbatical to brush up on the right security API to use when a security related application arrives on their desk. While falling into fear and panic is always an option, we felt it might be better to provide a book, drawing on our experience, that goes beyond what is commonly available in API documentation. A book that provides some basic real world examples of how to use the APIs and address the questions developers most commonly ask and the issues developers most commonly have trouble with. One with a warm friendly cover, designed to avoid panic, and to help keep the reader focused on the idea of getting a job done. It is our aim that "Java Cryptography: Tools and Techniques" is that book.
Table of Contents
- Acknowledgements
- Introduction
-
Chapter 1: Getting Started, an Overview
- The Java Provider Architecture
- Architecture of the Bouncy Castle APIs
- The Supporting APIs
- The Bouncy Castle FIPS distribution
- Installing Bouncy Castle
- A Word About Entropy
- Bits of Security
- Summary
-
Chapter 2: Block and Stream Ciphers
- The Basics
- Algorithm Security Strengths
- Block Ciphers
- Block Modes
- Streaming Block Modes
- Stream Ciphers
- Cipher Based Input/Output
- Summary
-
Chapter 3: Message Digests, MACs, HMACs, KDFs, and XOFs
- Message Digests
- MACs
- HMACs
- Key Derivation Functions
- Expandable Output Functions
- Bouncy Castle Calculator Interfaces for Digests and MACs
- An Application of Digests: Merkle Trees
- Summary
-
Chapter 4: Authenticated Modes, Key Wrapping, and the SealedObject
- Setup for the Examples
- Authenticated Encryption Modes
- Key Wrapping Algorithms
- The SealedObject Class
- Summary
-
Chapter 5: Password Based Key Generation and Key Splitting
- Password Based Key Generation
- PKCS5 Scheme 2
- SCRYPT
- Other PBKDFs
- Key Splitting
- An Implementation of Key Splitting
- Summary
-
Chapter 6: Signatures
- Key Pair Generation and Import
- Digital Signatures
- Signature Security Strengths
- The Digital Signature Algorithm
- DSA with Edwards Curves (EdDSA)
- DSTU 4145
- GOST
- RSA Signature Algorithms
- SM2
- Bouncy Castle Calculator Interfaces for Signatures
- Summary
-
Chapter 7: Key Transport, Key Agreement, and Key Exchange
- Algorithm Security Strengths
- Key Transport
- Key Agreement and Key Exchange
- Key Confirmation
- Summary
-
Chapter 8: X.509 Certificates and Attribute Certificates
- The X.500 Distinguished Name
- Public Key Certificates
- Creating a Basic Public Key Certificate
- Converting an X509CertificateHolder to an X509Certificate
- The CertificateFactory Class
- Creating a CA Certificate with Extensions
- Creating End-Entity Certificates
- Attribute Certificates
- Summary
-
Chapter 9: Certificate Revocation and Certificate Paths
- Certificate Revocation Lists (CRLs)
- Converting an X509CRLHolder to an X509CRL
- Obtaining Revocation Information from a Certificate Issuer
- Online Certificate Status Protocol
- Certificate Path Validation
- Summary
-
Chapter 10: Key and Certificate Storage
- Setup for the Examples
- Early KeyStore Types: JKS, JCEKS, BKS, and UBER
- The keytool Command
- The PKCS12 KeyStore Type
- The BCFKS/BCSFKS KeyStore Type
- Summary
-
Chapter 11: Cryptographic Message Syntax, S/MIME, and TSP
- Cryptographic Message Syntax
- Data Content
- SignedData Content
- EnvelopedData Content
- S/MIME
- Things to Watch With JavaMail
- Time-Stamp Protocol
- An Application of Time-Stamps: CAdES-T
- Summary
-
Chapter 12: Certification Requests and Certificate Management
- PKCS #10 Certification Requests
- Certificate Request Message Format
- Certificate Management over CMS
- Enrolment over Secure Transport
- Certificate Management Protocol
- Summary
-
Chapter 13: OpenPGP
- The Basics
- Generating Armored Output
- Generating Key Rings
- Adding a Sub-Key to an Existing Key Ring
- Encapsulated Signed Messages
- Detached Signatures
- Signing Text Data
- Cleartext Signatures
- Public Key Encryption
- PBE Encryption
- Keybox Files
- Using S-expressions for Private Keys
- Summary
-
Chapter 14: Transport Layer Security
- Introduction
- Installation
- Conventions
- Some Preparation - a Simple Protocol
- A Basic TLS Server
- A Basic TLS Client
- Using Client-Side Authentication
- Another Look a TrustManagers
- Properties
- BC JSSE Extensions
- Using the low level (D)TLS API
- The Low-level TLS API
- DTLS
- Low-level TLS API Overrides
- Specialist Protocols: PSK and SRP
- Summary
-
Chapter 15: The Future
- Installing the Bouncy Castle Post-Quantum Provider
- Stateful Signature Algorithms
- Stateless Signature Algorithms
- Key Encapsulation Mechanisms
- Hybrid Encryption
- Summary
-
Appendix A: ASN.1 and Bouncy Castle
- Basic ASN.1 Syntax
- The Types
- Encoding Rules
- Basic Guidance
- Defining Your Own Objects
-
Appendix B: The Bouncy Castle Kotlin API
- A Note on Packaging
- Generating a PKCS#10 Certification Request
- Generating a Certificate
- Appendix C: Algorithms provided by the Bouncy Castle Providers
- Acronyms and Definitions
- Bibliography and Further Reading
- Notes
The Leanpub 60-day 100% Happiness Guarantee
Within 60 days of purchase you can get a 100% refund on any Leanpub purchase, in two clicks.
See full terms
80% Royalties. Earn $16 on a $20 book.
We pay 80% royalties. That's not a typo: you earn $16 on a $20 sale. If we sell 5000 non-refunded copies of your book or course for $20, you'll earn $80,000.
(Yes, some authors have already earned much more than that on Leanpub.)
In fact, authors have earned$12,307,240writing, publishing and selling on Leanpub.
Learn more about writing on Leanpub
Free Updates. DRM Free.
If you buy a Leanpub book, you get free updates for as long as the author updates the book! Many authors use Leanpub to publish their books in-progress, while they are writing them. All readers get free updates, regardless of when they bought the book or how much they paid (including free).
Most Leanpub books are available in PDF (for computers) and EPUB (for phones, tablets and Kindle). The formats that a book includes are shown at the top right corner of this page.
Finally, Leanpub books don't have any DRM copy-protection nonsense, so you can easily read them on any supported device.
Learn more about Leanpub's ebook formats and where to read them
Top Books
OpenIntro Statistics
David Diez, Christopher Barr, Mine Cetinkaya-Rundel, and OpenIntroA complete foundation for Statistics, also serving as a foundation for Data Science.
Leanpub revenue supports OpenIntro (US-based nonprofit) so we can provide free desk copies to teachers interested in using OpenIntro Statistics in the classroom and expand the project to support free textbooks in other subjects.
More resources: openintro.org.
Personal Finance
Jason AndersonThis textbook provides an in-depth analysis on personal finance that is both practical and straightforward in its approach. It has been written in such a way that the readers can gain knowledge without getting overwhelmed by the technical terms. Suitable for both beginners and advanced learners.
Getting to Know IntelliJ IDEA
Trisha Gee and Helen ScottIf we treat our IDE as a text editor, we are doing ourselves a disservice. Using a combination of tutorials and a questions-and-answers approach, Getting to Know IntelliJ IDEA will help you find ways to use IntelliJ IDEA that enable you to work comfortably and productively as a professional developer.
C++20 - The Complete Guide
Nicolai M. JosuttisAll new language and library features of C++20 (for those who know previous C++ versions).
The book presents all new language and library features of C++20. Learn how this impacts day-to-day programming, to benefit in practice, to combine new features, and to avoid all new traps.
Buy early, pay less, free updates.
Other books:
Mastering STM32 - Second Edition
Carmine NovielloWith more than 1200 microcontrollers, STM32 is probably the most complete ARM Cortex-M platform on the market. This book aims to be the most complete guide around introducing the reader to this exciting MCU portfolio from ST Microelectronics and its official CubeHAL and STM32CubeIDE development environment.
R Programming for Data Science
Roger D. PengThis book brings the fundamentals of R programming to you, using the same material developed as part of the industry-leading Johns Hopkins Data Science Specialization. The skills taught in this book will lay the foundation for you to begin your journey learning data science. Printed copies of this book are available through Lulu.
Machine Learning Q and AI
Sebastian Raschka, PhDHave you recently completed a machine learning or deep learning course and wondered what to learn next? With 30 questions and answers on key concepts in machine learning and AI, this book provides bite-sized bits of knowledge for your journey to becoming a machine learning expert.
Stats One
William FooteThe Rails 7 Way
Obie Fernandez, Lucas Dohmen, and Tom Henrik AadlandThe Rails™ 7 Way is the comprehensive, authoritative reference guide for professionals delivering production-quality code using modern Ruby on Rails. It illuminates the entire Rails 7 API, its most powerful idioms, design approaches, and libraries. Building on the previous editions, this edition has been heavily refactored and updated.
Gradual Modularization for Ruby and Rails
Stephan HagemannGet yourself a new tool to manage your Rails application and your growing engineering organization! Prevent the ball-of-mud (and fix it!). Go for microservices or SOA if it makes sense not just because you don't have any other tool. Do all this through a low-overhead tool: packages. Enable better conversations to make practical changes today.
Top Bundles
- #1
Software Architecture
2 Books
"Software Architecture for Developers" is a practical and pragmatic guide to modern, lightweight software architecture, specifically aimed at developers. You'll learn:The essence of software architecture.Why the software architecture role should include coding, coaching and collaboration.The things that you really need to think about before... - #2
CCIE Service Provider Ultimate Study Bundle
2 Books
Piotr Jablonski, Lukasz Bromirski, and Nick Russo have joined forces to deliver the only CCIE Service Provider training resource you'll ever need. This bundle contains a detailed and challenging collection of workbook labs, plus an extensively detailed technical reference guide. All of us have earned the CCIE Service Provider certification... - #3
1500 QUIZ COMMENTATI (3 libri)
3 Books
Tre libri dei QUIZ MMG Commentati al prezzo di DUE! I QUIZ dei concorsi ufficiali di Medicina Generale relativi agli anni: 2000-2001-2003-2012-2013-2014-2015-2016-2017-2018-2019-2020-2021 +100 inediti Raccolti in unico bundle per aiutarvi nello studio e nella preparazione al concorso. All'interno di ogni libro i quiz sono stati suddivisi per... - #4
Pattern-Oriented Memory Forensics and Malware Detection
2 Books
This training bundle for security engineers and researchers, malware and memory forensics analysts includes two accelerated training courses for Windows memory dump analysis using WinDbg. It is also useful for technical support and escalation engineers who analyze memory dumps from complex software environments and need to check for possible... - #5
Practical FP in Scala + Functional event-driven architecture
2 Books
Practical FP in Scala (A hands-on approach) & Functional event-driven architecture, aka FEDA, (Powered by Scala 3), together as a bundle! The content of PFP in Scala is a requirement to understand FEDA so why not take advantage of this bundle!? - #6
Modern C++ Collection
3 Books
Get All about Modern C++C++ Standard Library, including C++20Concurrency with Modern C++, including C++20C++20Each book has about 200 complete code examples. Updates are included. When I update one of the books, you immediately get the updated bundle. You can expect significant updates to each new C++ standard (C++23, C++26, .. ) and also... - #7
Linux Administration Complet
4 Books
Ce lot comprend les quatre volumes du Guide Linux Administration :Linux Administration, Volume 1, Administration fondamentale : Guide pratique de préparation aux examens de certification LPIC 1, Linux Essentials, RHCSA et LFCS. Administration fondamentale. Introduction à Linux. Le Shell. Traitement du texte. Arborescence de fichiers. Sécurité... - #9
Development and Deployment of Multiplayer Online Games, Part ARCH. Architecture (Vol. I-III)
3 Books
What's the Big Idea? The idea behind this book is to summarize the body of knowledge that already exists on multiplayer games but is not available in one single place.And quite a fewof the issues discussed within this series (planned as three nine volumes ~300 pages each), while known in the industry, have not been published at all (except for... - #10
Growing Agile: The Complete Coach's Guide
7 Books
Growing Agile: Coach's Guide Series This bundle provides a collection of training and workshop plans for a variety of agile topics. The series is aimed at agile coaches, trainers and ScrumMasters who often find themselves needing to help teams understand agile concepts. Each book in the series provides the plans, slides, handouts and activity...