LEADER 00000cam a2200673Ii 4500 003 OCoLC 005 20240129213017.0 006 m o d 007 cr cnu|||unuuu 008 220418s2022 nyu ob 001 0 eng d 019 1311465865|a1311572569 020 9781484281055|q(electronic bk.) 020 1484281055|q(electronic bk.) 024 7 10.1007/978-1-4842-8105-5|2doi 029 1 AU@|b000071547491 029 1 AU@|b000071980592 035 (OCoLC)1311285711|z(OCoLC)1311465865|z(OCoLC)1311572569 037 9781484281055|bO'Reilly Media 040 ORMDA|beng|erda|epn|cORMDA|dEBLCP|dGW5XE|dYDX|dOCLCO|dYDX |dOCLCF|dN$T|dK6U|dUKAHL|dOCLCQ|dOCLCO 049 INap 082 04 005.13/3 082 04 005.13/3|223 099 eBook O'Reilly for Public Libraries 100 1 Nita, Stefania Loredana,|eauthor. 245 10 Cryptography and cryptanalysis in Java :|bcreating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10 /|cStefania Loredana Nita, Marius Iulian Mihailescu.|h[O'Reilly electronic resource] 264 1 New York :|bApress,|c[2022] 300 1 online resource (230 pages) 336 text|btxt|2rdacontent 337 computer|bc|2rdamedia 338 online resource|bcr|2rdacarrier 504 Includes bibliographical references and index. 505 0 Intro -- Table of Contents -- About the Authors -- About the Technical Reviewer -- Chapter 1: Introduction -- Cryptography and Cryptanalysis -- Book Structure -- Conclusion -- References -- Chapter 2: JDK 17: New Features -- Conclusion -- References -- Chapter 3: Roadmap and Vision for Jakarta EE 10 -- Conclusion -- References - - Chapter 4: Java Cryptography Architecture -- Architecture and Design Principles -- JCA Classes and Algorithms -- Algorithms and Engine Classes -- Interfaces and Main Classes -- Data Encryption -- Hash Functions -- Signatures -- Generating Signatures 505 8 Verifying the Signature -- Conclusion -- References -- Chapter 5: Classical Cryptography -- Caesar Cipher -- Implementation -- Cryptanalysis -- Vigenère Cipher -- Implementation -- Cryptanalysis -- Hill Cipher -- Implementation -- Cryptanalysis -- Conclusion -- References -- Chapter 6: Formal Techniques for Cryptography -- Definitions -- Probabilities and Statistics -- Conditional Probability -- Random Variables -- Entropy -- A Little Algebra -- Elliptic Curves -- Conclusion -- References -- Chapter 7: Pseudorandom Number Generators -- Examples of PRNGs -- Linear Congruential PRNGs 505 8 Blum-Blum-Shub PRNG -- Linear Circuit PRNGs -- Other PRNGs -- PRNGs Security -- Java.util.Random Class -- Conclusion -- References -- Chapter 8: Hash Functions -- Conclusion - - References -- Chapter 9: Symmetric Encryption Algorithms -- Data Encryption Standard -- The Generation of Keys -- Encryption and Decryption Process -- Operation Modes for DES -- Advanced Encryption Standard -- Encryption and Decryption Process -- Operation Modes for AES -- Conclusion -- References -- Chapter 10: Asymmetric Encryption Schemes -- RSA -- ElGamal -- Merkle-Hellman -- The Knapsack Approach -- Algorithms 505 8 Conclusion -- References -- Chapter 11: Signature Schemes -- Conclusion -- References -- Chapter 12: Identification Schemes -- FFS Identification protocol -- Conclusion -- References -- Chapter 13: Lattice-Based Cryptography and NTRU -- Practical Implementation of the NTRU Library -- Conclusion -- References -- Chapter 14: Advanced Encryption Schemes -- Homomorphic Encryption -- Searchable Encryption -- Conclusion -- References -- Chapter 15: Cryptography Tools -- CryptTool -- OpenSSL -- Conclusion - - References -- Index 520 Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 17 and Jakarta EE 10. It provides a robust introduction to Java 17's new features and updates, a roadmap for Jakarta EE 10 security mechanisms, a unique presentation of the "hot points" (advantages and disadvantages) from the Java Cryptography Architecture (JCA), and more. The book dives into the classical simple cryptosystems that form the basis of modern cryptography, with fully working solutions (encryption/decryption operations). Pseudo-random generators are discussed as well as real-life implementations. Hash functions are covered along with practical cryptanalysis methods and attacks, asymmetric and symmetric encryption systems, signature and identification schemes. The book wraps up with a presentation of lattice-based cryptography and the NTRU framework library. Modern encryption schemes for cloud and big data environments (homomorphic encryption and searchable encryption) also are included. After reading and using this book, you will be proficient with crypto algorithms and know how to apply them to problems you may encounter. What You Will Learn Develop programming skills for writing cryptography algorithms in Java Dive into security schemes and modules using Java Explore "good" vs "bad" cryptography based on processing execution times and reliability Play with pseudo-random generators, hash functions, etc. Leverage lattice-based cryptography methods, the NTRU framework library, and more Who This Book Is For Those who want to learn and leverage cryptography and cryptanalysis using Java. Some prior Java and/or algorithm programming exposure is highly recommended. 590 O'Reilly|bO'Reilly Online Learning: Academic/Public Library Edition 650 0 Java (Computer program language) 650 0 Cryptography. 650 0 Computer security. 650 0 Data encryption (Computer science) 650 2 Computer Security 650 6 Java (Langage de programmation) 650 6 Cryptographie. 650 6 Sécurité informatique. 650 6 Chiffrement (Informatique) 650 7 Computer security|2fast 650 7 Cryptography|2fast 650 7 Data encryption (Computer science)|2fast 650 7 Java (Computer program language)|2fast 700 1 Mihailescu, Marius Iulian,|eauthor. 776 08 |iPrint version:|z1484281047|z9781484281048 |w(OCoLC)1294284912 856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https:// learning.oreilly.com/library/view/~/9781484281055/?ar |zAvailable on O'Reilly for Public Libraries 938 Askews and Holts Library Services|bASKH|nAH40335697 938 ProQuest Ebook Central|bEBLB|nEBL6954122 938 YBP Library Services|bYANK|n17914167 938 EBSCOhost|bEBSC|n3267271 994 92|bJFN