Java Cryptography
Publisher: O'Reilly Media
Final Release Date: May 1998
Pages: 364

Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates, which prove identity (authentication); and digital signatures, which ensure your data has not been damaged or tampered with.This book covers cryptographic programming in Java. Java 1.1 and Java 1.2 provide extensive support for cryptography with an elegant architecture, the Java Cryptography Architecture (JCA). Another set of classes, the Java Cryptography Extension (JCE), provides additional cryptographic functionality. This book covers the JCA and the JCE from top to bottom, describing the use of the cryptographic classes as well as their innards.The book is designed for moderately experienced Java programmers who want to learn how to build cryptography into their applications. No prior knowledge of cryptography is assumed. The book is peppered with useful examples, ranging from simple demonstrations in the first chapter to full-blown applications in later chapters.Topics include:

  • The Java Cryptography Architecture (JCA)
  • The Java Cryptography Extension (JCE)
  • Cryptographic providers
  • The Sun key management tools
  • Message digests, digital signatures, and certificates (X509v3)
  • Block and stream ciphers
  • Implementations of the ElGamal signature and cipher algorithms
  • A network talk application that encrypts all data sent over the network
  • An email application that encrypts its messages
Covers JDK 1.2 and JCE 1.2.
Table of Contents
Product Details
About the Author
Colophon
Recommended for You
Customer Reviews

REVIEW SNAPSHOT®

by PowerReviews
oreillyJava Cryptography
 
3.6

(based on 9 reviews)

Ratings Distribution

  • 5 Stars

     

    (2)

  • 4 Stars

     

    (2)

  • 3 Stars

     

    (4)

  • 2 Stars

     

    (1)

  • 1 Stars

     

    (0)

Reviewed by 9 customers

Sort by

Displaying reviews 1-9

Back to top

 
3.0

Java Cryptography Review

By AzynchriX

from Undisclosed

Comments about oreilly Java Cryptography:

I would recommend this.

(2 of 2 customers found this review helpful)

 
2.0

Java Cryptography Review

By Dietrich Fahrenholtz

from Undisclosed

Comments about oreilly Java Cryptography:

First of all, I like to say that the book "Java Cryptography" by J. Knudson is very well written

and a pretty good introduction to Java Cryptography Architecture and its extensions (JCE). One can

quickly grasp the necessary details it takes to write one's own Java code that makes use of

cryptographic functions. However, I must confess there are better books on the market to enter

the subject of cryptography. Not that Knudsen's book would not make a decent intro into the

field but if you want to become a Java programmer that understands and knows to deal with more

than some cryptographic concepts/algorithms/protocols you need to consult other literature such

as Schneiers "Applied Cryptography" which has gotten a bit long in the tooth, though, or Menezes/

Oorschot/Vanstone "Handbook of Applied Cryptography" which is oriented more to mathematical

reader. Notice also that the field of cryptography is ever-evolving so what is considered secure

today might be insecure tomorrow. A famous example is the notorious DES algorithm which was broken

by cryptanalysts a few years ago and not only because of its comparatively short keysize but

also of other weaknesses.

Furthermore, I like to comment on a few spots where the author's handling with cryptographic

attainments is a bit too lax. I am referring to page 193 of 1998 edition. He wrote " ..., El-

GamalCipher will fill up an incomplete block with zeros, but it is unable to ..." This kind of

"padding the last block with zeros" is considered bad practice in the cryptographic community

and should be avoided because an attacker might exploit these known plaintext bits of the last

block. A better practice is to fill the remaining space of a block with random bits. I think

the author should have mentioned this factor somewhere but unfortunately he has not.

Next, I am referring to page 184, section "Key Pair Generation", item 2. He wrote "Choose two

other random numbers, g and x, both less than p." You should not choose both variables g and x

this way because g serves a special purpose. Variable g is known to be a primitive element (aka.

generator) of the group Z[p] where p is the prime modulus. A generator generates _all_ p-1 elements

of a group Z[p]. A random number, element of Z[p], not being a primitive element generates a

subgroup of Z[p]. The number of elements in this subgroup might be _significantly_ less than the

number of elements of the original supergroup. Consider the following calculation to show how many

primitive elements there are for a group Z[p] with a 2048 bit prime p.

"HAC" is an acronym for "Handbook of Applied Cryptography" mentioned above.

1 2 3

P(X) = Phi(Phi(p))/p-1 = Phi(p-1)/p-1 > (p-1/6 ln ln (p-1))/p-1 = 1 / 6 ln ln (p-1)

P denotes the probability,

X is the random variable that a number in the range from 1 to p-1 is a primitive element.

1: is by the Fact 2.132, iii

2: is by the Fact 2.101, i

3: is by the Fact 2.102 for p-1 > 5

So if the number of bits of p-1 is 2048 bits then we get 1 / 6 ln ln (p-1) ~ 0.023

That means only every 44th number is a generator and in my opinion this strongly disqualifies

the "any random number" approach by the author as a secure solution.

Do not get my wrong, the "any random number will do" approach might be appropriate for a book

that concentrates on teaching Java cryptography implementation aspects, such as this book, not

elaborating on an all-time secure solution. But if this is so the author is supposed to mention

it somewhere in the text which, unfortunately again, did not happen.

If you want to implement a really secure ElGamalCipher you need to consider precomputed big safe

primes and their associated generators. You can have a look at RFC2412 and at the internet draft

draft-ietf-ipsec-ike-modp-groups-04.txt to be found at www.ietf.org. I think this is a pretty

good excercise for students who mastered the basics.

Overall, I strongly encourage the author to revise the first edition and be a bit more rigorous

on security aspects of the implemented algorithms.

 
5.0

Java Cryptography Review

By bert

from Undisclosed

Comments about oreilly Java Cryptography:

Whats wrong with the Math???

Hey this book is a must for the budding Java programmer(make sure you can comfortably program in Java-or else it's just a book you'll struggle to understand the core facts while trying to grasp the language with) Top notch, go buy, go encrypt and stop your aunty sally from reading your "private" mail.

(2 of 2 customers found this review helpful)

 
3.0

Java Cryptography Review

By David Bejjam

from Undisclosed

Comments about oreilly Java Cryptography:

The word Cryptography scares many Java Programmers. This book clearly explains the fundamentals of Cryptography easily.

 
3.0

Java Cryptography Review

By Matt Hooker

from Undisclosed

Comments about oreilly Java Cryptography:

A good general read on Java Cryptography. There are a few errors in some of the code examples, but nothing that a quick glance over the Security API javadocs can't quickly fix. We had quite a major project on the go and the book was invaluable during that time. Well worth investing in. I would have given a higher rating, but I am a man in search of perfection and the fact that the book contained erroneous code prevents me from so doing.

 
4.0

Java Cryptography Review

By BHUSHAN.THAMMINENI

from Undisclosed

Comments about oreilly Java Cryptography:

Excellent book,when i was researching on cryptography

and related stuff,as our company wanted to become CSP

(cryptography service provider)on its own turn,after

loitering across thousands of pages over the net,i

found in this book thoughts that are crystalline and

distilled,about cryptography, where you could find

confluence of real mathematics and serious coding.

i recommend this book without hesitation to any

upcoming programmer,who wants become some day man

of difference.commendable work indeed.

 
5.0

Java Cryptography Review

By Li-fan Chen

from Undisclosed

Comments about oreilly Java Cryptography:

There's no better first book on cryptography for a programmer to buy.

You get a great deal of exposure to an important facet of network security through this little gem. It's friendly and to the point.

The Java API is excellent--but the idea of cryptography is little odd to the everyday web or network application programmer. Having someone to kindly bridge the crypto-what-ja-ma-call-its to a world of how-do-i-wrap-it-around-my-web-or-mail-service is simply priceless. There's NO silly cryptomath (because only those cryptoexperts get the math anyway) but instead it's filled with no-nonsense coverage of how each and every common crypto engine and crypto-"protocol" takes your stream of data and converts them to cryptograms. If you always like to learn as MUCH as you could about a particular computational wonder tool before tackling a project without turning your brain to mush with research mathematics--you'll like this book.

It's just one of those books I wished I read a lot earlier so I won't have an excuse to avoid APIs that exposes applied cryptography to network applications all these years. I highly recommend this book before you head on to the math of it.

It's too bad the SSL/TLS API for Java never made it into this first edition (it did make it into O'Reilly's latest Java network programming book though).

Any one know of a book just like this one but for another language like C or Perl? With a book like this you don't need to explain it all over again--but illustration and snippets of code showing how to use the various APIs in other languages would be useful. I think if the author is willing to dabble into all of these issues and give away his findings on a book website it will be just AWESOME! A second edition of said book with all of these issues covered would be just grand too :-)

 
4.0

Java Cryptography Review

By sean

from Undisclosed

Comments about oreilly Java Cryptography:

This book is for beginners??

Hmmm, once you get into security world, it should be estimated more than that...I guess..

As a java programmer who wishes to learn and use security algorithms, I couldn't find better book than this...(I didn't get bribes from Knudsen.)

 
3.0

Java Cryptography Review

By Omid Milani Fard

from Undisclosed

Comments about oreilly Java Cryptography:

This is a good book for begginer's on java cryptography!

OMID :)

Displaying reviews 1-9

Back to top

 
Buy 2 Get 1 Free Free Shipping Guarantee
Buying Options
Immediate Access - Go Digital what's this?
Ebook: $35.99
Formats:  DAISY, ePub, Mobi, PDF
Print & Ebook: $49.49
Print: $44.99