Details
Cryptography and Cryptanalysis in Java
Creating and Programming Advanced Algorithms with Java SE 21 LTS and Jakarta EE 11Second Edition
56,99 € |
|
Verlag: | Apress |
Format: | |
Veröffentl.: | 13.07.2024 |
ISBN/EAN: | 9798868804410 |
Sprache: | englisch |
Anzahl Seiten: | 215 |
Dieses eBook enthält ein Wasserzeichen.
Beschreibungen
<p>Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 21 and Jakarta EE 11. It provides a robust introduction to Java 21's new features and updates, a roadmap for Jakarta EE 11 security mechanisms, a unique presentation of the "hot points" (advantages and disadvantages) from the Java Cryptography Architecture (JCA), a new chapter on Quantum cryptography, and more. </p>
<p>The book dives into the classical simple cryptosystems that form the basis of modern cryptography, with fully working solutions (encryption/decryption operations). Pseudo-random generators are discussed as well as real-life implementations. Hash functions are covered along with practical cryptanalysis methods and attacks, asymmetric and symmetric encryption systems, signature and identification schemes.</p>
<p>The book wraps up with a presentation of lattice-based cryptography and the NTRU framework library. Modern encryption schemes for cloud and big data environments (homomorphic encryption and searchable encryption) also are included. After reading and using this book, you will be proficient with crypto algorithms and know how to apply them to problems you may encounter. </p>
<p> </p>
<p><strong>New to This Edition: </strong></p>
<p>The modernized Second Edition is updated to reflect the latest language features in Java 21 and Jakarta 11, along with the introduction of a new chapter on Quantum Cryptography (Chapter 6). </p>
<p> </p>
<p> </p>
<p><strong>What You Will Learn</strong></p>
<ul>
<li>Develop programming skills for writing cryptography algorithms in Java</li>
<li>Dive into security schemes and modules using Java</li>
<li>Explore “good” vs “bad” cryptography based on processing execution times and reliability</li>
<li>Play with pseudo-random generators, hash functions, etc.</li>
<li>Leverage lattice-based cryptography methods, the NTRU framework library, and more</li>
</ul>
<p> </p>
<p> </p>
<p><strong>Who This Book Is For</strong></p>
<p>Those who want to learn and leverage cryptography and cryptanalysis using Java. Some prior Java and/or algorithm programming exposure is highly recommended.</p>
<p>The book dives into the classical simple cryptosystems that form the basis of modern cryptography, with fully working solutions (encryption/decryption operations). Pseudo-random generators are discussed as well as real-life implementations. Hash functions are covered along with practical cryptanalysis methods and attacks, asymmetric and symmetric encryption systems, signature and identification schemes.</p>
<p>The book wraps up with a presentation of lattice-based cryptography and the NTRU framework library. Modern encryption schemes for cloud and big data environments (homomorphic encryption and searchable encryption) also are included. After reading and using this book, you will be proficient with crypto algorithms and know how to apply them to problems you may encounter. </p>
<p> </p>
<p><strong>New to This Edition: </strong></p>
<p>The modernized Second Edition is updated to reflect the latest language features in Java 21 and Jakarta 11, along with the introduction of a new chapter on Quantum Cryptography (Chapter 6). </p>
<p> </p>
<p> </p>
<p><strong>What You Will Learn</strong></p>
<ul>
<li>Develop programming skills for writing cryptography algorithms in Java</li>
<li>Dive into security schemes and modules using Java</li>
<li>Explore “good” vs “bad” cryptography based on processing execution times and reliability</li>
<li>Play with pseudo-random generators, hash functions, etc.</li>
<li>Leverage lattice-based cryptography methods, the NTRU framework library, and more</li>
</ul>
<p> </p>
<p> </p>
<p><strong>Who This Book Is For</strong></p>
<p>Those who want to learn and leverage cryptography and cryptanalysis using Java. Some prior Java and/or algorithm programming exposure is highly recommended.</p>
<p>1. Getting Started.- 2. JDK 21 Java New Features.- 3. The New Jakarta EE 11.- 4. Java Cryptography Architecture.- 5. Classical Cryptography.- 6. Quantum Cryptography.- 7. Formal Techniques for Cryptography.- 8. Pseudo-random Generators.- 9. Hash Functions.- 10. Symmetric Encryption Algorithms.- 11. Asymmetric Encryption Schemes.- 12. Advanced Encryption Schemes.- 13. Identification Schemes.- 14. Signature Schemes.- 15. Lattice based Cryptography and NTRU.- 16. Cryptography Tools.</p>
<p><strong>Stefania Loredana Nita, PhD,</strong> is a Lecturer at “Ferdinand I” Military Technical Academy of Bucharest and a Software Developer and Researcher at the Institute for Computers. Her PhD thesis was on advanced cryptographic schemes using searchable encryption and homomorphic encryption. At the Military Technical Academy she teaches courses of Formal Languages and Translators and Database Application Development. She has worked more than two years as an Assistant Lecturer at the University of Bucharest where she taught courses on subjects such as Advanced Programming Techniques, Simulation Methods, and Operating Systems. Her research activity is in the cryptography field, with a focus on searchable encryption and homomorphic encryption. She is also interested in blockchain, quantum cryptography, machine learning, and artificial intelligence. At the Institute for Computers she is working on research and development projects that involve cloud computing security, the Internet of Things, and big data. She has authored and co-authored more than 28 papers at conferences and in journals and has co-authored five books. She holds an MSc degree in Software Engineering and two BSc degrees, with one in Computer Science and one in Mathematics.</p>
<p> </p>
<p><strong>Marius Iulian Mihailescu, PhD,</strong> has worked in academic and industry sectors for more than 15 years. Currently, he is an Associate Professor (Senior Lecturer) in the Faculty of Engineering and Computer Science at “Spiru Haret” University, Romania, and also has a side job as Project Manager at the Institute for Computers where he is managing projects using different technologies, such as DevOps, Scrum, Agile, C#, Microsoft SQL Server, Syncfusion, ASP.NET, and VUE. At the university he taught several key computer science courses, such as Information Security, Functional Programming, Internet of Things, Blockchain, Software Development Methods (Microsoft Azure, Entity Framework, NHibernate, Linq-to-SQL, UX with DevExpress controls, etc.), and Development Web Applications (HTML 5, CSS 3, Bootstrap, JavaScript, AJAX, nodeJS, VUE, Laravel, mRabbit, ASP.NET, PHP). He authored and co-authored more than 30 articles at conference proceedings, 25 articles in journals, and six books. For three years he worked as IT Officer at Royal Caribbean Cruises Ltd, where he dealt with IT infrastructure, data security, and satellite communication systems. He received his PhD in 2014 and his thesis was on applied cryptography over biometrics data. He holds two MSc degrees in Information Security and Software Engineering, from “Ferdinand I” Military Technical Academy and University of Bucharest, Romania.</p>
<p> </p>
<p> </p>
<p> </p>
<p><strong>Marius Iulian Mihailescu, PhD,</strong> has worked in academic and industry sectors for more than 15 years. Currently, he is an Associate Professor (Senior Lecturer) in the Faculty of Engineering and Computer Science at “Spiru Haret” University, Romania, and also has a side job as Project Manager at the Institute for Computers where he is managing projects using different technologies, such as DevOps, Scrum, Agile, C#, Microsoft SQL Server, Syncfusion, ASP.NET, and VUE. At the university he taught several key computer science courses, such as Information Security, Functional Programming, Internet of Things, Blockchain, Software Development Methods (Microsoft Azure, Entity Framework, NHibernate, Linq-to-SQL, UX with DevExpress controls, etc.), and Development Web Applications (HTML 5, CSS 3, Bootstrap, JavaScript, AJAX, nodeJS, VUE, Laravel, mRabbit, ASP.NET, PHP). He authored and co-authored more than 30 articles at conference proceedings, 25 articles in journals, and six books. For three years he worked as IT Officer at Royal Caribbean Cruises Ltd, where he dealt with IT infrastructure, data security, and satellite communication systems. He received his PhD in 2014 and his thesis was on applied cryptography over biometrics data. He holds two MSc degrees in Information Security and Software Engineering, from “Ferdinand I” Military Technical Academy and University of Bucharest, Romania.</p>
<p> </p>
<p> </p>
<p>Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 21 and Jakarta EE 11. It provides a robust introduction to Java 21's new features and updates, a roadmap for Jakarta EE 11 security mechanisms, a unique presentation of the "hot points" (advantages and disadvantages) from the Java Cryptography Architecture (JCA), a new chapter on Quantum cryptography, and more. </p>
<p>The book dives into the classical simple cryptosystems that form the basis of modern cryptography, with fully working solutions (encryption/decryption operations). Pseudo-random generators are discussed as well as real-life implementations. Hash functions are covered along with practical cryptanalysis methods and attacks, asymmetric and symmetric encryption systems, signature and identification schemes.</p>
<p>The book wraps up with a presentation of lattice-based cryptography and the NTRU framework library. Modern encryption schemes for cloud and big data environments (homomorphic encryption and searchable encryption) also are included. After reading and using this book, you will be proficient with crypto algorithms and know how to apply them to problems you may encounter. </p>
<p> </p>
<p><strong>New to This Edition: </strong></p>
<p>The modernized Second Edition is updated to reflect the latest language features in Java 21 and Jakarta 11, along with the introduction of a new chapter on Quantum Cryptography (Chapter 6). </p>
<p>What You Will Learn</p>
<ul>
<li>Develop programming skills for writing cryptography algorithms in Java</li>
<li>Dive into security schemes and modules using Java</li>
<li>Explore “good” vs “bad” cryptography based on processing execution times and reliability</li>
<li>Play with pseudo-random generators, hash functions, etc.</li>
<li>Leverage lattice-based cryptography methods, the NTRU framework library, and more</li>
</ul>
<p> </p>
<p> </p>
<p> </p>
<p>The book dives into the classical simple cryptosystems that form the basis of modern cryptography, with fully working solutions (encryption/decryption operations). Pseudo-random generators are discussed as well as real-life implementations. Hash functions are covered along with practical cryptanalysis methods and attacks, asymmetric and symmetric encryption systems, signature and identification schemes.</p>
<p>The book wraps up with a presentation of lattice-based cryptography and the NTRU framework library. Modern encryption schemes for cloud and big data environments (homomorphic encryption and searchable encryption) also are included. After reading and using this book, you will be proficient with crypto algorithms and know how to apply them to problems you may encounter. </p>
<p> </p>
<p><strong>New to This Edition: </strong></p>
<p>The modernized Second Edition is updated to reflect the latest language features in Java 21 and Jakarta 11, along with the introduction of a new chapter on Quantum Cryptography (Chapter 6). </p>
<p>What You Will Learn</p>
<ul>
<li>Develop programming skills for writing cryptography algorithms in Java</li>
<li>Dive into security schemes and modules using Java</li>
<li>Explore “good” vs “bad” cryptography based on processing execution times and reliability</li>
<li>Play with pseudo-random generators, hash functions, etc.</li>
<li>Leverage lattice-based cryptography methods, the NTRU framework library, and more</li>
</ul>
<p> </p>
<p> </p>
<p> </p>
Contrasts “good” vs “bad” cryptography based on processing execution times and reliability Source code available on GitHub Shows you how to write security schemes and modules using Java 21 and Jakarta EE 11
Diese Produkte könnten Sie auch interessieren:
A Software Process Model Handbook for Incorporating People's Capabilities
von: Silvia T. Acuna, Natalia Juristo, Ana Maria Moreno, Alicia Mon
149,79 €