Books & Videos

Table of Contents

  1. Chapter 1 Introduction

    1. Secure Systems

    2. Cryptography

    3. Platform Security

    4. Astute Inequalities

    5. Hello, zoT1wy1njA0=!

  2. Chapter 2 Concepts

    1. Confidentiality

    2. Integrity

    3. Authentication

    4. Random Numbers

    5. Algorithms

  3. Chapter 3 Architecture

    1. Alphabet Soup

    2. Concept Classes

    3. API and SPI

    4. Factory Methods

    5. Standard Names

    6. The Provider Architecture

    7. Key Management

    8. Summary

  4. Chapter 4 Random Numbers

    1. SecureRandom

    2. Self-Seeding

    3. Keyboard Timing

    4. SeederDialog

  5. Chapter 5 Key Management

    1. Keys

    2. Key Generators

    3. Key Translators

    4. Key Agreement

    5. The Identity Key Management Paradigm

    6. The KeyStore Key Management Paradigm

  6. Chapter 6 Authentication

    1. Message Digests

    2. MACs

    3. Signatures

    4. Certificates

  7. Chapter 7 Encryption

    1. Streams and Blocks

    2. Block Ciphers

    3. Algorithms

    4. javax.crypto.Cipher

    5. Cipher’s Close Relatives

    6. Passphrase Encryption

    7. Inside Cipher

    8. Hybrid Systems

  8. Chapter 8 Signed Applets

    1. Renegade

    2. HotJava

    3. Navigator

    4. Internet Explorer

    5. Summary

  9. Chapter 9 Writing a Provider

    1. Getting Started

    2. Adding the ElGamal Classes

    3. ElGamal

    4. Generating Keys

    5. Signature

    6. Cipher

  10. Chapter 10 SafeTalk

    1. Using SafeTalk

    2. Under the Hood

  11. Chapter 11 CipherMail

    1. Using CipherMail

    2. Under the Hood

  12. Chapter 12 Outside the Box

    1. Application Design

    2. Decompilers and Bytecode Obfuscation

    3. Endpoint Security

    4. File Security

    5. Network Security

    6. Summary

  1. Appendix BigInteger

  2. Appendix Base64

  3. Appendix JAR

    1. Creating

    2. Extracting

    3. The Manifest

    4. Signing

  4. Appendix Javakey

    1. Creating

    2. Inspecting

    3. Gimme the Keys...

    4. Certificates

    5. To and Fro

    6. Sign of the Times

    7. The Care and Feeding of Keys

  5. Appendix Quick Reference

    1. Package java.security

    2. Package java.security.cert

    3. Package java.security.interfaces

    4. Package java.security.spec

    5. Package javax.crypto

    6. Package javax.crypto.interfaces

    7. Package javax.crypto.spec

  6. Colophon