Tous nos rayons

Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Cryptography and Cryptanalysis in Java: Creating and Programming Advanced Algorithms with Java SE 17
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Cryptography and Cryptanalysis in Java: Creating and Programming Advanced Algorithms with Java SE 17

Cryptography and Cryptanalysis in Java: Creating and Programming Advanced Algorithms with Java SE 17

Stefania Loredana / Mihailescu Nita

227 pages, parution le 15/04/2022

Résumé

Intermediate user level

Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 17 and Jakarta EE 10. It provides a robust introduction to Java 17's new features and updates, a roadmap for Jakarta EE 10 security mechanisms, a unique presentation of the "hot points" (advantages and disadvantages) from the Java Cryptography Architecture (JCA), and more.

The book dives into the classical simple cryptosystems that form the basis of modern cryptography, with fully working solutions (encryption/decryption operations). Pseudo-random generators are discussed as well as real-life implementations. Hash functions are covered along with practical cryptanalysis methods and attacks, asymmetric and symmetric encryption systems, signature and identification schemes.

The book wraps up with a presentation of lattice-based cryptography and the NTRU framework library. Modern encryption schemes for cloud and big data environments (homomorphic encryption and searchable encryption) also are included. After reading and using this book, you will be proficient with crypto algorithms and know how to apply them to problems you may encounter.

What You Will Learn

  • Develop programming skills for writing cryptography algorithms in Java
  • Dive into security schemes and modules using Java
  • Explore "good" vs "bad" cryptography based on processing execution times and reliability
  • Play with pseudo-random generators, hash functions, etc.
  • Leverage lattice-based cryptography methods, the NTRU framework library, and more

Who This Book Is For

Those who want to learn and leverage cryptography and cryptanalysis using Java. Some prior Java and/or algorithm programming exposure is highly recommended.

Chapter 01 - IntroductionChapter 02 - JDK 17: Java 17 New FeaturesChapter 03 - Road to Jakarta EE10 and Security MechanismsChapter 04 - Java Cryptography Architecture (java.security.*)Chapter 05 - Classical Cryptography5.1. Some Simple Cryptosystems5.1.1. Shift Cipher (Caesar)5.1.2. Substitution Cipher5.1.3. Affine Cipher5.1.4. Vigenere Cipher5.1.5. Hill Cipher5.1.6. Transposition Cipher5.1.7. Columnar Transposition Cipher5.1.8. Rail Fence Cipher5.1.9. Stream Ciphers5.2. Cryptanalysis 5.2.1. Cryptanalysis of Caesar 5.2.2. Cryptanalysis of Affine Cipher 5.2.3. Cryptanalysis of Substitution Cipher 5.2.4. Cryptanalysis of Vigenere Cipher 5.2.5. Known Plaintext Attack on the Hill CipherChapter 06. Formal Techniques for Cryptography 6.1. Galois Fields 6.2. Elliptic CurvesChapter 07. Pseudo-random GeneratorsChapter 08. Hash Functions8.1. MessageDigest Java Class8.2. Common Hash Functions 8.2.1. SHA-3 Keccak Hash Functions 8.2.2. SHA-2 Cryptography Hash Functions Family 8.2.2.1. SHA-512 8.2.2.2. SHA-384 8.2.2.3. SHA-256 8.2.2.4. SHA-224 8.2.3. MD Hash Functions 8.2.3.1. MD2 8.2.3.2. MD4 8.2.3.3. MD5 8.2.3.4. MD6 8.2.4. RIPEMD 8.2.5. SWIFT 8.2.6. WHIRLPOOL 8.2.7. BLAKE 8.2.8. Collisions Hash Functions 8.2.9. Birthday AttackChapter 09 - Symmetric Encryption Algorithms9.1. Case Study: The Data Encryption Standard (DES) 9.1.1. Linear and Differential Cryptanalysis for DES9.2. Advanced Encryption Standard (AES)Chapter 10 - Asymmetric Encryption Schemes10.1. RSA10.2. El Gamal 10.3. Merkle-Hellman Knapsack System10.4. McEliece SystemChapter 11 - Signature Schemes 11.1. Digital Signature Standard 11.2. El Gamal Signature 11.3. Undeniable SignaturesChapter 12 - Identification SchemesChapter 13 - Lattice-based Cryptography and NTRUChapter 14 - Modern/Advanced Encryption Schemes 14.1. Homomorphic Encryption 14.2. Searchable EncryptionChapter 15 - Cryptography Tools
Stefania Loredana Nita , PhD, is a software developer at the Institute of Computer Science of the Romanian Academy and a PhD with her thesis on advanced cryptographic schemes using searchable encryption and homomorphic encryption. She has served more than two years as an assistant lecturer at the University of Bucharest where she taught courses on subjects such as advanced programming techniques, simulation methods, and operating systems. She has authored and co-authored more than 15 work papers for conferences and journals, and has authored two books on he Haskell programming language. She is a lead guest editor for special issues on information security and cryptography such as advanced cryptography and its future: searchable and homomorphic encryption. She holds an MSc in software engineering and two BSc in computer science and mathematics.
Marius Iulian Mihailescu , PhD is CEO at Dapyx Solution Ltd., a company based in Bucharest, Romania. He is involved in information security- and cryptography-related research projects. He is a lead guest editor for applied cryptography journals and a reviewer for multiple publications with information security and cryptography profiles. He authored and co-authored more than 30 articles for conference proceedings, 25 articles in journals, and three books. For more than six years he has served as a lecturer at well-known national and international universities (University of Bucharest, "Titu Maiorescu" University, Kadir Has University in, Istanbul, Turkey). He has taught courses on programming languages (C#, Java, C++, Haskell), and object-oriented system analysis and design with UML, graphs, databases, cryptography, and information security. He served for three years as IT officer at Royal Caribbean Cruises Ltd. where he dealt with IT infrastructure, data security, and satellite communications systems. He received his PhD in 2014 and his thesis was on applied cryptography over biometric data. He holds two MSc in information security and software engineering.

Caractéristiques techniques

  PAPIER
Éditeur(s) Apress
Auteur(s) Stefania Loredana / Mihailescu Nita
Parution 15/04/2022
Nb. de pages 227
EAN13 9781484281048

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav.client@eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription