Cryptography and cryptanalysis in Java: creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10
Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 17 and Jakarta EE 10. It provides a robust introduction to Java 17's new features and updates, a roadmap for Jakarta EE 10 security mechanis...
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
New York
Apress
[2022]
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781484281055/?ar |
Zusammenfassung: | Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 17 and Jakarta EE 10. It provides a robust introduction to Java 17's new features and updates, a roadmap for Jakarta EE 10 security mechanisms, a unique presentation of the "hot points" (advantages and disadvantages) from the Java Cryptography Architecture (JCA), and more. The book dives into the classical simple cryptosystems that form the basis of modern cryptography, with fully working solutions (encryption/decryption operations). Pseudo-random generators are discussed as well as real-life implementations. Hash functions are covered along with practical cryptanalysis methods and attacks, asymmetric and symmetric encryption systems, signature and identification schemes. The book wraps up with a presentation of lattice-based cryptography and the NTRU framework library. Modern encryption schemes for cloud and big data environments (homomorphic encryption and searchable encryption) also are included. After reading and using this book, you will be proficient with crypto algorithms and know how to apply them to problems you may encounter. What You Will Learn Develop programming skills for writing cryptography algorithms in Java Dive into security schemes and modules using Java Explore "good" vs "bad" cryptography based on processing execution times and reliability Play with pseudo-random generators, hash functions, etc. Leverage lattice-based cryptography methods, the NTRU framework library, and more Who This Book Is For Those who want to learn and leverage cryptography and cryptanalysis using Java. Some prior Java and/or algorithm programming exposure is highly recommended. |
Beschreibung: | Includes bibliographical references and index |
Umfang: | 1 Online-Ressource (230 Seiten) |
ISBN: | 9781484281055 1484281055 |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-077856848 | ||
003 | DE-627-1 | ||
005 | 20240228121640.0 | ||
007 | cr uuu---uuuuu | ||
008 | 220513s2022 xx |||||o 00| ||eng c | ||
020 | |a 9781484281055 |c electronic bk. |9 978-1-4842-8105-5 | ||
020 | |a 1484281055 |c electronic bk. |9 1-4842-8105-5 | ||
035 | |a (DE-627-1)077856848 | ||
035 | |a (DE-599)KEP077856848 | ||
035 | |a (ORHE)9781484281055 | ||
035 | |a (DE-627-1)077856848 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM051280 |2 bisacsh | |
082 | 0 | |a 005.13/3 |2 23 | |
100 | 1 | |a Nita, Stefania Loredana |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Cryptography and cryptanalysis in Java |b creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10 |c Stefania Loredana Nita, Marius Iulian Mihailescu |
264 | 1 | |a New York |b Apress |c [2022] | |
300 | |a 1 Online-Ressource (230 Seiten) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | |a Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 17 and Jakarta EE 10. It provides a robust introduction to Java 17's new features and updates, a roadmap for Jakarta EE 10 security mechanisms, a unique presentation of the "hot points" (advantages and disadvantages) from the Java Cryptography Architecture (JCA), and more. The book dives into the classical simple cryptosystems that form the basis of modern cryptography, with fully working solutions (encryption/decryption operations). Pseudo-random generators are discussed as well as real-life implementations. Hash functions are covered along with practical cryptanalysis methods and attacks, asymmetric and symmetric encryption systems, signature and identification schemes. The book wraps up with a presentation of lattice-based cryptography and the NTRU framework library. Modern encryption schemes for cloud and big data environments (homomorphic encryption and searchable encryption) also are included. After reading and using this book, you will be proficient with crypto algorithms and know how to apply them to problems you may encounter. What You Will Learn Develop programming skills for writing cryptography algorithms in Java Dive into security schemes and modules using Java Explore "good" vs "bad" cryptography based on processing execution times and reliability Play with pseudo-random generators, hash functions, etc. Leverage lattice-based cryptography methods, the NTRU framework library, and more Who This Book Is For Those who want to learn and leverage cryptography and cryptanalysis using Java. Some prior Java and/or algorithm programming exposure is highly recommended. | ||
650 | 0 | |a Java (Computer program language) | |
650 | 0 | |a Cryptography | |
650 | 0 | |a Computer security | |
650 | 0 | |a Data encryption (Computer science) | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Java (Langage de programmation) | |
650 | 4 | |a Cryptographie | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Chiffrement (Informatique) | |
650 | 4 | |a Computer security | |
650 | 4 | |a Cryptography | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Java (Computer program language) | |
700 | 1 | |a Mihailescu, Marius Iulian |e VerfasserIn |4 aut | |
776 | 1 | |z 1484281047 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1484281047 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781484281055/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-077856848 |
---|---|
_version_ | 1829007735399645184 |
adam_text | |
any_adam_object | |
author | Nita, Stefania Loredana Mihailescu, Marius Iulian |
author_facet | Nita, Stefania Loredana Mihailescu, Marius Iulian |
author_role | aut aut |
author_sort | Nita, Stefania Loredana |
author_variant | s l n sl sln m i m mi mim |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)077856848 (DE-599)KEP077856848 (ORHE)9781484281055 |
dewey-full | 005.13/3 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.13/3 |
dewey-search | 005.13/3 |
dewey-sort | 15.13 13 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03730cam a22005532c 4500</leader><controlfield tag="001">ZDB-30-ORH-077856848</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121640.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">220513s2022 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781484281055</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4842-8105-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1484281055</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4842-8105-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)077856848</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP077856848</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781484281055</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)077856848</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM051280</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.13/3</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Nita, Stefania Loredana</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptography and cryptanalysis in Java</subfield><subfield code="b">creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10</subfield><subfield code="c">Stefania Loredana Nita, Marius Iulian Mihailescu</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York</subfield><subfield code="b">Apress</subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (230 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 17 and Jakarta EE 10. It provides a robust introduction to Java 17's new features and updates, a roadmap for Jakarta EE 10 security mechanisms, a unique presentation of the "hot points" (advantages and disadvantages) from the Java Cryptography Architecture (JCA), and more. The book dives into the classical simple cryptosystems that form the basis of modern cryptography, with fully working solutions (encryption/decryption operations). Pseudo-random generators are discussed as well as real-life implementations. Hash functions are covered along with practical cryptanalysis methods and attacks, asymmetric and symmetric encryption systems, signature and identification schemes. The book wraps up with a presentation of lattice-based cryptography and the NTRU framework library. Modern encryption schemes for cloud and big data environments (homomorphic encryption and searchable encryption) also are included. After reading and using this book, you will be proficient with crypto algorithms and know how to apply them to problems you may encounter. What You Will Learn Develop programming skills for writing cryptography algorithms in Java Dive into security schemes and modules using Java Explore "good" vs "bad" cryptography based on processing execution times and reliability Play with pseudo-random generators, hash functions, etc. Leverage lattice-based cryptography methods, the NTRU framework library, and more Who This Book Is For Those who want to learn and leverage cryptography and cryptanalysis using Java. Some prior Java and/or algorithm programming exposure is highly recommended.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Java (Computer program language)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Java (Langage de programmation)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptographie</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Chiffrement (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Java (Computer program language)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mihailescu, Marius Iulian</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">1484281047</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1484281047</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781484281055/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-077856848 |
illustrated | Not Illustrated |
indexdate | 2025-04-10T09:35:01Z |
institution | BVB |
isbn | 9781484281055 1484281055 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (230 Seiten) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Apress |
record_format | marc |
spelling | Nita, Stefania Loredana VerfasserIn aut Cryptography and cryptanalysis in Java creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10 Stefania Loredana Nita, Marius Iulian Mihailescu New York Apress [2022] 1 Online-Ressource (230 Seiten) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 17 and Jakarta EE 10. It provides a robust introduction to Java 17's new features and updates, a roadmap for Jakarta EE 10 security mechanisms, a unique presentation of the "hot points" (advantages and disadvantages) from the Java Cryptography Architecture (JCA), and more. The book dives into the classical simple cryptosystems that form the basis of modern cryptography, with fully working solutions (encryption/decryption operations). Pseudo-random generators are discussed as well as real-life implementations. Hash functions are covered along with practical cryptanalysis methods and attacks, asymmetric and symmetric encryption systems, signature and identification schemes. The book wraps up with a presentation of lattice-based cryptography and the NTRU framework library. Modern encryption schemes for cloud and big data environments (homomorphic encryption and searchable encryption) also are included. After reading and using this book, you will be proficient with crypto algorithms and know how to apply them to problems you may encounter. What You Will Learn Develop programming skills for writing cryptography algorithms in Java Dive into security schemes and modules using Java Explore "good" vs "bad" cryptography based on processing execution times and reliability Play with pseudo-random generators, hash functions, etc. Leverage lattice-based cryptography methods, the NTRU framework library, and more Who This Book Is For Those who want to learn and leverage cryptography and cryptanalysis using Java. Some prior Java and/or algorithm programming exposure is highly recommended. Java (Computer program language) Cryptography Computer security Data encryption (Computer science) Computer Security Java (Langage de programmation) Cryptographie Sécurité informatique Chiffrement (Informatique) Mihailescu, Marius Iulian VerfasserIn aut 1484281047 Erscheint auch als Druck-Ausgabe 1484281047 |
spellingShingle | Nita, Stefania Loredana Mihailescu, Marius Iulian Cryptography and cryptanalysis in Java creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10 Java (Computer program language) Cryptography Computer security Data encryption (Computer science) Computer Security Java (Langage de programmation) Cryptographie Sécurité informatique Chiffrement (Informatique) |
title | Cryptography and cryptanalysis in Java creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10 |
title_auth | Cryptography and cryptanalysis in Java creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10 |
title_exact_search | Cryptography and cryptanalysis in Java creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10 |
title_full | Cryptography and cryptanalysis in Java creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10 Stefania Loredana Nita, Marius Iulian Mihailescu |
title_fullStr | Cryptography and cryptanalysis in Java creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10 Stefania Loredana Nita, Marius Iulian Mihailescu |
title_full_unstemmed | Cryptography and cryptanalysis in Java creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10 Stefania Loredana Nita, Marius Iulian Mihailescu |
title_short | Cryptography and cryptanalysis in Java |
title_sort | cryptography and cryptanalysis in java creating and programming advanced algorithms with java se 17 lts and jakarta ee 10 |
title_sub | creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10 |
topic | Java (Computer program language) Cryptography Computer security Data encryption (Computer science) Computer Security Java (Langage de programmation) Cryptographie Sécurité informatique Chiffrement (Informatique) |
topic_facet | Java (Computer program language) Cryptography Computer security Data encryption (Computer science) Computer Security Java (Langage de programmation) Cryptographie Sécurité informatique Chiffrement (Informatique) |
work_keys_str_mv | AT nitastefanialoredana cryptographyandcryptanalysisinjavacreatingandprogrammingadvancedalgorithmswithjavase17ltsandjakartaee10 AT mihailescumariusiulian cryptographyandcryptanalysisinjavacreatingandprogrammingadvancedalgorithmswithjavase17ltsandjakartaee10 |