文档介绍:Java security, Part 1: Crypto basics
Presented by developerWorks, your source for great tutorials
Table of Contents
If you're viewing this document online, you can click any of the topics below to link directly to that section.
1. About this tutorial....................................................... 2
2. Java security programming concepts............................... 4
3. Ensuring the integrity of a message ................................ 7
4. Keeping a message confidential..................................... 11
5. Secret messages with public keys .................................. 15
6. Signatures without paper ............................................. 18
7. Proving you are who you are......................................... 23
8. Trusting the code....................................................... 26
9. SSL/TLS: Securing C/S communication............................ 28
10. Wrapup and resources............................................... 31
Java security, Part 1: Crypto basics Page 1 of 33
Presented by developerWorks, your source for great tutorials
Section 1. About this tutorial
What is this tutorial about?
There is perhaps no software engineering topic of more timely importance than application
security. Attacks are costly, whether the attack comes from inside or out, and some attacks
can expose a software company to liability for damages. As computer (and especially
Internet) technologies evolve, security attacks are becoming more sophisticated and
frequent. Staying on top of the most up-to-date techniques and tools is one key to application
security; the other is a solid foundation in proven technologies such as data encryption,
authentication, and authorization.
The Java platform, both the basic language and library extensions, provides an excellent
foundation for writing secure applications. This tutorial