Skip to main content
IBM  
Shop Support Downloads
IBM Home Products Consulting Industries News About IBM
IBM developerWorks : Java : Education - Tutorials
Java security, Part 1: Crypto basics
ZIPPDF (letter)PDF (A4)e-mail
Main menuSection menuFeedbackNext
10. Wrapup and resources
  


Summary page 1 of 3


This tutorial introduced the major cryptographic building blocks that can be used to provide a vast array of application security solutions. You've become familiar with such Java security topics as:

  • Built-in features that facilitate secure programming (no pointers, a bytecode verifier, fine-grained control over resource access for both applets and applications, a large number of library functions for all the major cryptographic building blocks, and SSL).

  • Secure programming techniques (proper storage and deletion of passwords and intelligent serialization).

  • Features newly integrated in JDK 1.4 (JCE, JSSE, JAAS, JGSS, and CertPath API).

  • Enriching, third-party security offerings.

And the following concepts:

  • Message digests
  • Message authentication codes
  • Private key cryptography
  • Public key cryptography
  • Digital signatures
  • Digital certificates
  • Certification authorities and paths
  • Code signing
  • SSL/TLS

You should be well poised to explore Java security in more detail (see the Resources section) and to take the next tutorial, Java security, Part 2: Authentication and authorization.


Main menuSection menuFeedbackNext
About IBM | Privacy | Legal | Contact