ACCU Home page ACCU Conference Page
Search Contact us ACCU at Flickr ACCU at GitHib ACCU at Facebook ACCU at Linked-in ACCU at Twitter Skip Navigation

Search in Book Reviews

The ACCU passes on review copies of computer books to its members for them to review. The result is a large, high quality collection of book reviews by programmers, for programmers. Currently there are 1949 reviews in the database and more every month.
Search is a simple string search in either book title or book author. The full text search is a search of the text of the review.
    View all alphabetically
Java Cryptography
Jonathan Knudsen
1 56592 402 9
Brian Bramer
java; cryptography
Appeared in:
With the rapid growth of the commercial use of the Internet security has become critical and this book covers Java support for cryptography, i.e. the JCA (Java Cryptography Architecture) and the JCE, an Extension which only available for US/Canadian distribution (there are re-implementations developed outside the US).

It starts with a review of cryptography concepts sufficient to understand and use the APIs and an overview of the Java cryptography packages. There are then chapters describing random numbers (
), Key management (generators, translators, etc.), authentication (message digests, signatures, certificates, etc.) and encryption (symmetric, asymmetric and hybrid ciphers). Signed applets are then described with implementations for Hotjava, Netscape and Internet Explorer (each browser has different formats and procedures). Security providers (which provide algorithm classes) are then discussed showing how to implement a simple provider and moving on to a full set of tools. A pair of applications using the concepts and tools described in previous chapters are then implemented. First a secure network talk application which enables two users on different computers to type messages to each other. Second a cryptographically enabled email client (so one can send and receive encrypted and authenticated messages over the Internet).

An interesting and informative book covering very important issues. Essential reading for programmers (it assumes a working knowledge of Java) implementing Java based software where security is critical. Most of the example programs are available from the publishers web site; some may not be legally posted online because the US Government regards some encryption software as weapons! Highly recommended!