SlideShare une entreprise Scribd logo
1  sur  24
Télécharger pour lire hors ligne
Cryptography in Java


               tnngo2@gmail.com
Cryptography

      to maintain and protect the confidentiality of the information when
      it is transmitted on a communication medium

      is the mechanism of encoding information is secret coded form.

      keep communications limited and private to only the sender and
      receiver

      enhances the security, authenticity and integrity of the
      information passed across the communication medium
Cryptography Schemes

     The process of cryptography is achieved with the help of
     encryption algorithm and an encryption key

     The encryption algorithm is a mathematical procedure to
     encrypt or decrypt the data.

     Encryption key is the input that encryption algorithm takes
Cryptography Algorithm Types

      Secret Key Cryptography (Symmetric)
              Two entities share the same secret key.


      Public Key Cryptography (Asymmetric)
              Operates under two different keys.
              One is used for encoding, the second for decoding.


      Hash Functions (One-way cryptography, Message digests)
               Encrypt the information into an irreversible codes.
Need for cryptography

      In order to develop a secure database application, cryptography is
      needed to identify all the possible threats to the application and
      provide measures to prevent them.

      The threats:
              Violation of Privacy/confidentiality
                         Data can be read by an unintended receiver.


              Tampering
                         modifying or deleting a resource without
                         proper access privilege


              Spoofing
                         impersonating the identity of a different user and use it in an
                         unauthorized way
Purpose of Cryptography

      Authentication
                  prevents spoofing by applying the digital
                  signature


      Privacy/confidentiality
                  verifies, prevents unintended receiver from
                  reading the data


      Integrity
                  verifies whether the data received by the receiver
                  is the same data as sent by the sender


      Non-repudiation
                  ensures that a user or a business organization or
                  program entity has performed a transaction
Java Cryptography Architecture (JCA)

      JCA is a framework written in Java to access and develop
      cryptographic functionality, and forms part of the Java security API



      Java Cryptography Extension (JCE) extends the underlying
      architecture of JCA to implement encryption, key exchange

      JCA and JCE together provide a complete, platform-independent API.
Design Principles of JCA

      JCA was designed to access cryptography and security concepts.

      Implementation independence and interoperability.

      Algorithm independence and extensibility
Components of JCA

     Cryptographic Service Providers
             is a package or a set of packages defined by the JCA to
             implement one or more cryptographic services.



     Key Management
            manage the library of keys and certificates which in a
            database called keystore.
            KeyStore class in the java.security package
Cryptographic Service

      The Service provider classes are also known as Engine classes.
Classes and Interfaces of JCA
Core Engine Classes of JCA
Java Cryptography Extension (JCE)

      JCA is a set of packages that form a framework and provides
      implementations for encryption, key generations and agreement,
      and Message Authentication Code (MAC) algorithms.

      Additional cryptographic libraries can be plugged in.
Java Cryptography Extension APIs

      Symmetric block encryption
      Symmetric stream encryption
      Password-based encryption
      Key Agreement
      Message Authentication Codes
Packages in JCE
Cipher

         is the object capable of performing encryption and decryption as per
         an encryption algorithm.

         is one of core classes from JCE

         javax.crypto
Methods of Cipher

      getInstance()
      init()
      update()
      doFinal()
      getBlockSize()
      getAlgorithm()
      getProvider()
Password Based encryption (PBE)

      generates a secret encryption key based on a password provided by
      the end user.

      is one of core classes from JCE

      javax.crypto
Password Based encryption (PBE)

      mix in a random number with the password, called the salt

      prevent dictionary attacks or pre-computation attacks
PBEParameterSpec Class
SecretKeyFactory Class
Encrypting Data using Passwords

      Take the string and create an instance of PBEKeySpec

      Use a SecretKeyFactory to produce a SecretKey instance

      Generate a random salt

      Select an iteration count and create a PBEParameterSpec

      Create a Cipher from the SecretKey and PBEParameterSpec

      Encrypt the data with the Cipher and write output of the Cipher
Encrypting Data using Passwords
Encrypting Data using Passwords

Contenu connexe

Tendances

Hybrid cryptographic technique using rsa algorithm and scheduling concepts
Hybrid cryptographic technique using rsa algorithm and scheduling conceptsHybrid cryptographic technique using rsa algorithm and scheduling concepts
Hybrid cryptographic technique using rsa algorithm and scheduling conceptsIJNSA Journal
 
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryptionSecuring broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryptionLeMeniz Infotech
 
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryptionSecuring broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryptionShakas Technologies
 
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption Adz91 Digital Ads Pvt Ltd
 
Cryptography and attacks ins
Cryptography and attacks insCryptography and attacks ins
Cryptography and attacks insAstha Parihar
 
fucking shit
fucking shitfucking shit
fucking shiteyalrav
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
 
Cryptography and PKI
Cryptography and PKICryptography and PKI
Cryptography and PKIRabei Hassan
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptographyRahulprasad Yadav
 

Tendances (20)

Hybrid cryptographic technique using rsa algorithm and scheduling concepts
Hybrid cryptographic technique using rsa algorithm and scheduling conceptsHybrid cryptographic technique using rsa algorithm and scheduling concepts
Hybrid cryptographic technique using rsa algorithm and scheduling concepts
 
Cryptography
CryptographyCryptography
Cryptography
 
Cn ppt
Cn pptCn ppt
Cn ppt
 
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryptionSecuring broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption
 
S/MIME
S/MIMES/MIME
S/MIME
 
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryptionSecuring broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption
 
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption
 
Inscibe and Squeeze
Inscibe and SqueezeInscibe and Squeeze
Inscibe and Squeeze
 
Ppt
PptPpt
Ppt
 
Cryptography and attacks ins
Cryptography and attacks insCryptography and attacks ins
Cryptography and attacks ins
 
Pgp
PgpPgp
Pgp
 
Security Basics
Security BasicsSecurity Basics
Security Basics
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
fucking shit
fucking shitfucking shit
fucking shit
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 
CRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITYCRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITY
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 
Cryptography and PKI
Cryptography and PKICryptography and PKI
Cryptography and PKI
 
Pgp
PgpPgp
Pgp
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 

En vedette

Authentication Systems
Authentication SystemsAuthentication Systems
Authentication SystemsBit Hacker
 
Software product development services company creative technosoft systems
Software product development services company creative technosoft systemsSoftware product development services company creative technosoft systems
Software product development services company creative technosoft systemsCreative Technosoft Systems
 
Vessels & Access Forum
Vessels & Access ForumVessels & Access Forum
Vessels & Access Forumgm330
 
Encourage webinar participation through gamification
Encourage webinar participation through gamificationEncourage webinar participation through gamification
Encourage webinar participation through gamificationNatalie Denmeade
 
Observing Solid, Liquid and Gas Particles Day 2
Observing Solid, Liquid and Gas Particles Day 2Observing Solid, Liquid and Gas Particles Day 2
Observing Solid, Liquid and Gas Particles Day 2jmori1
 
Teatro de la sensacion danza moderna infantil-jornadas de puertas abiertas
Teatro de la sensacion danza moderna infantil-jornadas de puertas abiertasTeatro de la sensacion danza moderna infantil-jornadas de puertas abiertas
Teatro de la sensacion danza moderna infantil-jornadas de puertas abiertasMiguel Muñoz de Morales
 
Eliot and modernism
Eliot and modernismEliot and modernism
Eliot and modernismms_faris
 
Privacy and security on twitter
Privacy and security on twitterPrivacy and security on twitter
Privacy and security on twitterEman Aldakheel
 
Cathedral of Saint Mary Magdalene
Cathedral of Saint Mary MagdaleneCathedral of Saint Mary Magdalene
Cathedral of Saint Mary MagdaleneTigu Rius
 
Putting the wow into your school's wom, NYSAIS Presentation
Putting the wow into your school's wom, NYSAIS PresentationPutting the wow into your school's wom, NYSAIS Presentation
Putting the wow into your school's wom, NYSAIS PresentationRick Newberry
 
Golf Center Kiev
Golf Center KievGolf Center Kiev
Golf Center Kievjshappo
 
3D Workshop - Stereoscopic Post-Production and Visual Effects
3D Workshop - Stereoscopic Post-Production and Visual Effects3D Workshop - Stereoscopic Post-Production and Visual Effects
3D Workshop - Stereoscopic Post-Production and Visual EffectsRick Baumgartner
 
2) exam section a question 1
2) exam section a   question 12) exam section a   question 1
2) exam section a question 1adamporter
 
Distribution (1)
Distribution (1)Distribution (1)
Distribution (1)NShuttle
 

En vedette (20)

Authentication Systems
Authentication SystemsAuthentication Systems
Authentication Systems
 
Software product development services company creative technosoft systems
Software product development services company creative technosoft systemsSoftware product development services company creative technosoft systems
Software product development services company creative technosoft systems
 
Vessels & Access Forum
Vessels & Access ForumVessels & Access Forum
Vessels & Access Forum
 
Hyperactivity
HyperactivityHyperactivity
Hyperactivity
 
Encourage webinar participation through gamification
Encourage webinar participation through gamificationEncourage webinar participation through gamification
Encourage webinar participation through gamification
 
Observing Solid, Liquid and Gas Particles Day 2
Observing Solid, Liquid and Gas Particles Day 2Observing Solid, Liquid and Gas Particles Day 2
Observing Solid, Liquid and Gas Particles Day 2
 
Fighting cleanup routines
Fighting cleanup routinesFighting cleanup routines
Fighting cleanup routines
 
Cosug 2012-lzy
Cosug 2012-lzyCosug 2012-lzy
Cosug 2012-lzy
 
Teatro de la sensacion danza moderna infantil-jornadas de puertas abiertas
Teatro de la sensacion danza moderna infantil-jornadas de puertas abiertasTeatro de la sensacion danza moderna infantil-jornadas de puertas abiertas
Teatro de la sensacion danza moderna infantil-jornadas de puertas abiertas
 
Presentation1
Presentation1Presentation1
Presentation1
 
Eliot and modernism
Eliot and modernismEliot and modernism
Eliot and modernism
 
SHAHU MAHARAJ
SHAHU MAHARAJSHAHU MAHARAJ
SHAHU MAHARAJ
 
Privacy and security on twitter
Privacy and security on twitterPrivacy and security on twitter
Privacy and security on twitter
 
Cathedral of Saint Mary Magdalene
Cathedral of Saint Mary MagdaleneCathedral of Saint Mary Magdalene
Cathedral of Saint Mary Magdalene
 
Putting the wow into your school's wom, NYSAIS Presentation
Putting the wow into your school's wom, NYSAIS PresentationPutting the wow into your school's wom, NYSAIS Presentation
Putting the wow into your school's wom, NYSAIS Presentation
 
Seven things to make your pup ONE in a million
Seven things to make your pup ONE in a millionSeven things to make your pup ONE in a million
Seven things to make your pup ONE in a million
 
Golf Center Kiev
Golf Center KievGolf Center Kiev
Golf Center Kiev
 
3D Workshop - Stereoscopic Post-Production and Visual Effects
3D Workshop - Stereoscopic Post-Production and Visual Effects3D Workshop - Stereoscopic Post-Production and Visual Effects
3D Workshop - Stereoscopic Post-Production and Visual Effects
 
2) exam section a question 1
2) exam section a   question 12) exam section a   question 1
2) exam section a question 1
 
Distribution (1)
Distribution (1)Distribution (1)
Distribution (1)
 

Similaire à Jdbc 6

Security via Java
Security via JavaSecurity via Java
Security via JavaBahaa Zaid
 
Iaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd Iaetsd
 
CN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptxCN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptxGarimaJain745610
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPrabhatMishraAbvp
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptvinitajain703
 
Presentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYPresentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYBARATH800940
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...Editor IJMTER
 
Cryptography /Sankar jayam
Cryptography /Sankar jayamCryptography /Sankar jayam
Cryptography /Sankar jayamtasankar14
 
A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...ijsrd.com
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysIJORCS
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysIJORCS
 
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTSHYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTSIJNSA Journal
 

Similaire à Jdbc 6 (20)

Security via Java
Security via JavaSecurity via Java
Security via Java
 
Iaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security with
 
CN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptxCN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptx
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
Presentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYPresentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHY
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
Java Crypto
Java CryptoJava Crypto
Java Crypto
 
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
 
Cloud Security Mechanisms
Cloud Security MechanismsCloud Security Mechanisms
Cloud Security Mechanisms
 
Cryptography /Sankar jayam
Cryptography /Sankar jayamCryptography /Sankar jayam
Cryptography /Sankar jayam
 
Sankar jayam
Sankar jayamSankar jayam
Sankar jayam
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...
 
Cryptography
CryptographyCryptography
Cryptography
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
 
Mj3422172221
Mj3422172221Mj3422172221
Mj3422172221
 
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTSHYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
 

Plus de Tuan Ngo

Introduction of cg program for portal 20120424 en
Introduction of cg program for portal 20120424 enIntroduction of cg program for portal 20120424 en
Introduction of cg program for portal 20120424 enTuan Ngo
 
Net framework
Net frameworkNet framework
Net frameworkTuan Ngo
 
15 anonymous methods, partial types and nullable types
15   anonymous methods, partial types and nullable types15   anonymous methods, partial types and nullable types
15 anonymous methods, partial types and nullable typesTuan Ngo
 
14 generics and iterators
14   generics and iterators14   generics and iterators
14 generics and iteratorsTuan Ngo
 
13 collections
13   collections13   collections
13 collectionsTuan Ngo
 
11 exception handling
11   exception handling11   exception handling
11 exception handlingTuan Ngo
 
12 events and delegates
12   events and delegates12   events and delegates
12 events and delegatesTuan Ngo
 
9 properties & indexers
9   properties & indexers9   properties & indexers
9 properties & indexersTuan Ngo
 
10 namespace
10  namespace10  namespace
10 namespaceTuan Ngo
 
8 abstract classes and interfaces
8   abstract classes and interfaces 8   abstract classes and interfaces
8 abstract classes and interfaces Tuan Ngo
 
7 inheritance and polymorphism
7   inheritance and polymorphism7   inheritance and polymorphism
7 inheritance and polymorphismTuan Ngo
 
6 class and methods
6    class and methods6    class and methods
6 class and methodsTuan Ngo
 
3 statements and operators
3   statements and operators3   statements and operators
3 statements and operatorsTuan Ngo
 
4 c# programming constructs
4   c# programming constructs4   c# programming constructs
4 c# programming constructsTuan Ngo
 
1 get started with c#
1   get started with c#1   get started with c#
1 get started with c#Tuan Ngo
 
2 variables and data types
2   variables and data types2   variables and data types
2 variables and data typesTuan Ngo
 

Plus de Tuan Ngo (20)

Introduction of cg program for portal 20120424 en
Introduction of cg program for portal 20120424 enIntroduction of cg program for portal 20120424 en
Introduction of cg program for portal 20120424 en
 
Net framework
Net frameworkNet framework
Net framework
 
15 anonymous methods, partial types and nullable types
15   anonymous methods, partial types and nullable types15   anonymous methods, partial types and nullable types
15 anonymous methods, partial types and nullable types
 
14 generics and iterators
14   generics and iterators14   generics and iterators
14 generics and iterators
 
13 collections
13   collections13   collections
13 collections
 
11 exception handling
11   exception handling11   exception handling
11 exception handling
 
12 events and delegates
12   events and delegates12   events and delegates
12 events and delegates
 
9 properties & indexers
9   properties & indexers9   properties & indexers
9 properties & indexers
 
10 namespace
10  namespace10  namespace
10 namespace
 
8 abstract classes and interfaces
8   abstract classes and interfaces 8   abstract classes and interfaces
8 abstract classes and interfaces
 
7 inheritance and polymorphism
7   inheritance and polymorphism7   inheritance and polymorphism
7 inheritance and polymorphism
 
5 arrays
5   arrays5   arrays
5 arrays
 
6 class and methods
6    class and methods6    class and methods
6 class and methods
 
3 statements and operators
3   statements and operators3   statements and operators
3 statements and operators
 
4 c# programming constructs
4   c# programming constructs4   c# programming constructs
4 c# programming constructs
 
1 get started with c#
1   get started with c#1   get started with c#
1 get started with c#
 
2 variables and data types
2   variables and data types2   variables and data types
2 variables and data types
 
Jdbc 7
Jdbc 7Jdbc 7
Jdbc 7
 
Jdbc 3
Jdbc 3Jdbc 3
Jdbc 3
 
Jdbc 2
Jdbc 2Jdbc 2
Jdbc 2
 

Dernier

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Dernier (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Jdbc 6

  • 1. Cryptography in Java tnngo2@gmail.com
  • 2. Cryptography to maintain and protect the confidentiality of the information when it is transmitted on a communication medium is the mechanism of encoding information is secret coded form. keep communications limited and private to only the sender and receiver enhances the security, authenticity and integrity of the information passed across the communication medium
  • 3. Cryptography Schemes The process of cryptography is achieved with the help of encryption algorithm and an encryption key The encryption algorithm is a mathematical procedure to encrypt or decrypt the data. Encryption key is the input that encryption algorithm takes
  • 4. Cryptography Algorithm Types Secret Key Cryptography (Symmetric) Two entities share the same secret key. Public Key Cryptography (Asymmetric) Operates under two different keys. One is used for encoding, the second for decoding. Hash Functions (One-way cryptography, Message digests) Encrypt the information into an irreversible codes.
  • 5. Need for cryptography In order to develop a secure database application, cryptography is needed to identify all the possible threats to the application and provide measures to prevent them. The threats: Violation of Privacy/confidentiality Data can be read by an unintended receiver. Tampering modifying or deleting a resource without proper access privilege Spoofing impersonating the identity of a different user and use it in an unauthorized way
  • 6. Purpose of Cryptography Authentication prevents spoofing by applying the digital signature Privacy/confidentiality verifies, prevents unintended receiver from reading the data Integrity verifies whether the data received by the receiver is the same data as sent by the sender Non-repudiation ensures that a user or a business organization or program entity has performed a transaction
  • 7. Java Cryptography Architecture (JCA) JCA is a framework written in Java to access and develop cryptographic functionality, and forms part of the Java security API Java Cryptography Extension (JCE) extends the underlying architecture of JCA to implement encryption, key exchange JCA and JCE together provide a complete, platform-independent API.
  • 8. Design Principles of JCA JCA was designed to access cryptography and security concepts. Implementation independence and interoperability. Algorithm independence and extensibility
  • 9. Components of JCA Cryptographic Service Providers is a package or a set of packages defined by the JCA to implement one or more cryptographic services. Key Management manage the library of keys and certificates which in a database called keystore. KeyStore class in the java.security package
  • 10. Cryptographic Service The Service provider classes are also known as Engine classes.
  • 13. Java Cryptography Extension (JCE) JCA is a set of packages that form a framework and provides implementations for encryption, key generations and agreement, and Message Authentication Code (MAC) algorithms. Additional cryptographic libraries can be plugged in.
  • 14. Java Cryptography Extension APIs Symmetric block encryption Symmetric stream encryption Password-based encryption Key Agreement Message Authentication Codes
  • 16. Cipher is the object capable of performing encryption and decryption as per an encryption algorithm. is one of core classes from JCE javax.crypto
  • 17. Methods of Cipher getInstance() init() update() doFinal() getBlockSize() getAlgorithm() getProvider()
  • 18. Password Based encryption (PBE) generates a secret encryption key based on a password provided by the end user. is one of core classes from JCE javax.crypto
  • 19. Password Based encryption (PBE) mix in a random number with the password, called the salt prevent dictionary attacks or pre-computation attacks
  • 22. Encrypting Data using Passwords Take the string and create an instance of PBEKeySpec Use a SecretKeyFactory to produce a SecretKey instance Generate a random salt Select an iteration count and create a PBEParameterSpec Create a Cipher from the SecretKey and PBEParameterSpec Encrypt the data with the Cipher and write output of the Cipher