Cryptography and Cryptanalysis in Java
Cryptography and Cryptanalysis in Java, Apress
Creating and Programming Advanced Algorithms with Java SE 17 LTS and Jakarta EE 10
Von Stefania Loredana Nita, Marius Iulian Mihailescu, im heise Shop in digitaler Fassung erhältlich
Creating and Programming Advanced Algorithms with Java SE 17 LTS and Jakarta EE 10
Von Stefania Loredana Nita, Marius Iulian Mihailescu, im heise Shop in digitaler Fassung erhältlich
Produktinformationen "Cryptography and Cryptanalysis in Java"
Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 17 and Jakarta EE 10. It provides a robust introduction to Java 17's new features and updates, a roadmap for Jakarta EE 10 security mechanisms, a unique presentation of the "hot points" (advantages and disadvantages) from the Java Cryptography Architecture (JCA), and more.
The book dives into the classical simple cryptosystems that form the basis of modern cryptography, with fully working solutions (encryption/decryption operations). Pseudo-random generators are discussed as well as real-life implementations. Hash functions are covered along with practical cryptanalysis methods and attacks, asymmetric and symmetric encryption systems, signature and identification schemes.
The book wraps up with a presentation of lattice-based cryptography and the NTRU framework library. Modern encryption schemes for cloud and big data environments (homomorphic encryption and searchable encryption) also are included. After reading and using this book, you will be proficient with crypto algorithms and know how to apply them to problems you may encounter.
WHAT YOU WILL LEARN
* Develop programming skills for writing cryptography algorithms in Java
* Dive into security schemes and modules using Java
* Explore “good” vs “bad” cryptography based on processing execution times and reliability
* Play with pseudo-random generators, hash functions, etc.
* Leverage lattice-based cryptography methods, the NTRU framework library, and more
WHO THIS BOOK IS FOR
Those who want to learn and leverage cryptography and cryptanalysis using Java. Some prior Java and/or algorithm programming exposure is highly recommended.
STEFANIA LOREDANA NITA, PhD, is a software developer at the Institute of Computer Science of the Romanian Academy and a PhD with her thesis on advanced cryptographic schemes using searchable encryption and homomorphic encryption. She has served more than two years as an assistant lecturer at the University of Bucharest where she taught courses on subjects such as advanced programming techniques, simulation methods, and operating systems. She has authored and co-authored more than 15 work papers for conferences and journals, and has authored two books on he Haskell programming language. She is a lead guest editor for special issues on information security and cryptography such as advanced cryptography and its future: searchable and homomorphic encryption. She holds an MSc in software engineering and two BSc in computer science and mathematics.
MARIUS IULIAN MIHAILESCU, PhD is CEO at Dapyx Solution Ltd., a company based in Bucharest, Romania. He is involved in information security- and cryptography-related research projects. He is a lead guest editor for applied cryptography journals and a reviewer for multiple publications with information security and cryptography profiles. He authored and co-authored more than 30 articles for conference proceedings, 25 articles in journals, and three books. For more than six years he has served as a lecturer at well-known national and international universities (University of Bucharest, “Titu Maiorescu” University, Kadir Has University in, Istanbul, Turkey). He has taught courses on programming languages (C#, Java, C++, Haskell), and object-oriented system analysis and design with UML, graphs, databases, cryptography, and information security. He served for three years as IT officer at Royal Caribbean Cruises Ltd. where he dealt with IT infrastructure, data security, and satellite communications systems. He received his PhD in 2014 and his thesis was on applied cryptography over biometric data. He holds two MSc in information security and software engineering.
Chapter 01 – Introduction
Chapter 02 – JDK 17: Java 17 New Features
Chapter 03 – Road to Jakarta EE10 and Security Mechanisms
Chapter 04 – Java Cryptography Architecture (java.security.*)
Chapter 05 – Classical Cryptography
5.1. Some Simple Cryptosystems5.1.1. Shift Cipher (Caesar)
5.1.2. Substitution Cipher
5.1.3. Affine Cipher
5.1.4. Vigenere Cipher
5.1.5. Hill Cipher
5.1.6. Transposition Cipher
5.1.7. Columnar Transposition Cipher
5.1.8. Rail Fence Cipher
5.1.9. Stream Ciphers
5.2. Cryptanalysis
5.2.1. Cryptanalysis of Caesar
5.2.2. Cryptanalysis of Affine Cipher
5.2.3. Cryptanalysis of Substitution Cipher
5.2.4. Cryptanalysis of Vigenere Cipher
5.2.5. Known Plaintext Attack on the Hill Cipher
Chapter 06. Formal Techniques for Cryptography
6.1. Galois Fields
6.2. Elliptic Curves
Chapter 07. Pseudo-random Generators
Chapter 08. Hash Functions8.1. MessageDigest Java Class
8.2. Common Hash Functions
8.2.1. SHA-3 Keccak Hash Functions
8.2.2. SHA-2 Cryptography Hash Functions Family
8.2.2.1. SHA-512
8.2.2.2. SHA-384 8.2.2.3. SHA-256
8.2.2.4. SHA-224
8.2.3. MD Hash Functions
8.2.3.1. MD2
8.2.3.2. MD4
8.2.3.3. MD5 8.2.3.4. MD6
8.2.4. RIPEMD
8.2.5. SWIFT
8.2.6. WHIRLPOOL
8.2.7. BLAKE
8.2.8. Collisions Hash Functions 8.2.9. Birthday Attack
Chapter 09 – Symmetric Encryption Algorithms
9.1. Case Study: The Data Encryption Standard (DES)
9.1.1. Linear and Differential Cryptanalysis for DES
9.2. Advanced Encryption Standard (AES)
Chapter 10 – Asymmetric Encryption Schemes10.1. RSA
10.2. El Gamal
10.3. Merkle-Hellman Knapsack System
10.4. McEliece System
Chapter 11 – Signature Schemes
11.1. Digital Signature Standard
11.2. El Gamal Signature 11.3. Undeniable Signatures
Chapter 12 – Identification Schemes
Chapter 13 – Lattice-based Cryptography and NTRU
Chapter 14 – Modern/Advanced Encryption Schemes
14.1. Homomorphic Encryption
14.2. Searchable EncryptionChapter 15 – Cryptography Tools
The book dives into the classical simple cryptosystems that form the basis of modern cryptography, with fully working solutions (encryption/decryption operations). Pseudo-random generators are discussed as well as real-life implementations. Hash functions are covered along with practical cryptanalysis methods and attacks, asymmetric and symmetric encryption systems, signature and identification schemes.
The book wraps up with a presentation of lattice-based cryptography and the NTRU framework library. Modern encryption schemes for cloud and big data environments (homomorphic encryption and searchable encryption) also are included. After reading and using this book, you will be proficient with crypto algorithms and know how to apply them to problems you may encounter.
WHAT YOU WILL LEARN
* Develop programming skills for writing cryptography algorithms in Java
* Dive into security schemes and modules using Java
* Explore “good” vs “bad” cryptography based on processing execution times and reliability
* Play with pseudo-random generators, hash functions, etc.
* Leverage lattice-based cryptography methods, the NTRU framework library, and more
WHO THIS BOOK IS FOR
Those who want to learn and leverage cryptography and cryptanalysis using Java. Some prior Java and/or algorithm programming exposure is highly recommended.
STEFANIA LOREDANA NITA, PhD, is a software developer at the Institute of Computer Science of the Romanian Academy and a PhD with her thesis on advanced cryptographic schemes using searchable encryption and homomorphic encryption. She has served more than two years as an assistant lecturer at the University of Bucharest where she taught courses on subjects such as advanced programming techniques, simulation methods, and operating systems. She has authored and co-authored more than 15 work papers for conferences and journals, and has authored two books on he Haskell programming language. She is a lead guest editor for special issues on information security and cryptography such as advanced cryptography and its future: searchable and homomorphic encryption. She holds an MSc in software engineering and two BSc in computer science and mathematics.
MARIUS IULIAN MIHAILESCU, PhD is CEO at Dapyx Solution Ltd., a company based in Bucharest, Romania. He is involved in information security- and cryptography-related research projects. He is a lead guest editor for applied cryptography journals and a reviewer for multiple publications with information security and cryptography profiles. He authored and co-authored more than 30 articles for conference proceedings, 25 articles in journals, and three books. For more than six years he has served as a lecturer at well-known national and international universities (University of Bucharest, “Titu Maiorescu” University, Kadir Has University in, Istanbul, Turkey). He has taught courses on programming languages (C#, Java, C++, Haskell), and object-oriented system analysis and design with UML, graphs, databases, cryptography, and information security. He served for three years as IT officer at Royal Caribbean Cruises Ltd. where he dealt with IT infrastructure, data security, and satellite communications systems. He received his PhD in 2014 and his thesis was on applied cryptography over biometric data. He holds two MSc in information security and software engineering.
Chapter 01 – Introduction
Chapter 02 – JDK 17: Java 17 New Features
Chapter 03 – Road to Jakarta EE10 and Security Mechanisms
Chapter 04 – Java Cryptography Architecture (java.security.*)
Chapter 05 – Classical Cryptography
5.1. Some Simple Cryptosystems5.1.1. Shift Cipher (Caesar)
5.1.2. Substitution Cipher
5.1.3. Affine Cipher
5.1.4. Vigenere Cipher
5.1.5. Hill Cipher
5.1.6. Transposition Cipher
5.1.7. Columnar Transposition Cipher
5.1.8. Rail Fence Cipher
5.1.9. Stream Ciphers
5.2. Cryptanalysis
5.2.1. Cryptanalysis of Caesar
5.2.2. Cryptanalysis of Affine Cipher
5.2.3. Cryptanalysis of Substitution Cipher
5.2.4. Cryptanalysis of Vigenere Cipher
5.2.5. Known Plaintext Attack on the Hill Cipher
Chapter 06. Formal Techniques for Cryptography
6.1. Galois Fields
6.2. Elliptic Curves
Chapter 07. Pseudo-random Generators
Chapter 08. Hash Functions8.1. MessageDigest Java Class
8.2. Common Hash Functions
8.2.1. SHA-3 Keccak Hash Functions
8.2.2. SHA-2 Cryptography Hash Functions Family
8.2.2.1. SHA-512
8.2.2.2. SHA-384 8.2.2.3. SHA-256
8.2.2.4. SHA-224
8.2.3. MD Hash Functions
8.2.3.1. MD2
8.2.3.2. MD4
8.2.3.3. MD5 8.2.3.4. MD6
8.2.4. RIPEMD
8.2.5. SWIFT
8.2.6. WHIRLPOOL
8.2.7. BLAKE
8.2.8. Collisions Hash Functions 8.2.9. Birthday Attack
Chapter 09 – Symmetric Encryption Algorithms
9.1. Case Study: The Data Encryption Standard (DES)
9.1.1. Linear and Differential Cryptanalysis for DES
9.2. Advanced Encryption Standard (AES)
Chapter 10 – Asymmetric Encryption Schemes10.1. RSA
10.2. El Gamal
10.3. Merkle-Hellman Knapsack System
10.4. McEliece System
Chapter 11 – Signature Schemes
11.1. Digital Signature Standard
11.2. El Gamal Signature 11.3. Undeniable Signatures
Chapter 12 – Identification Schemes
Chapter 13 – Lattice-based Cryptography and NTRU
Chapter 14 – Modern/Advanced Encryption Schemes
14.1. Homomorphic Encryption
14.2. Searchable EncryptionChapter 15 – Cryptography Tools
Artikel-Details
- Anbieter:
- Apress
- Autor:
- Marius Iulian Mihailescu, Stefania Loredana Nita
- Artikelnummer:
- 9781484281055
- Veröffentlicht:
- 15.04.22
- Seitenanzahl:
- 227