Java中的密码学和密码分析:用Java创建和编程高级算法

Java中的密码学和密码分析:用Java创建和编程高级算法

Java中的密码学和密码分析:用Java创建和编程高级算法
下面是关于Java加密和密码分析的深入指南。这本书包括用Java 17和Jakarta EE 10实现的具有挑战性的加密解决方案。它有力地介绍了Java 17的新功能和更新、雅加达EE 10安全机制的路线图、Java加密体系结构(JCA)的“热点”(优缺点)的独特介绍,等等。
这本书深入探讨了构成现代密码学基础的经典简单密码系统,以及完全有效的解决方案(加密/解密操作)。本文讨论了伪随机生成器以及实际实现。本课程将介绍哈希函数,以及实用的密码分析方法和攻击、不对称和对称加密系统、签名和身份验证方案。
本书最后介绍了基于晶格的密码学和NTRU框架库。还包括针对云和大数据环境的现代加密方案(同态加密和可搜索加密)。阅读并使用本书后,您将精通密码算法,并知道如何将其应用于可能遇到的问题。
你将学到什么
培养用Java编写加密算法的编程技能
使用Java深入了解安全方案和模块
基于处理执行时间和可靠性,探索“好”与“坏”加密
使用伪随机生成器、散列函数等。
利用基于晶格的加密方法、NTRU框架库等
这本书是给谁的
那些想学习并利用Java加密和密码分析的人。强烈建议您先接触Java和/或算法编程。
Cryptography and Cryptanalysis in Java: Creating and Programming Advanced Algorithms with Java
Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 17 and Jakarta EE 10. It provides a robust introduction to Java 17’s new features and updates, a roadmap for Jakarta EE 10 security mechanisms, a unique presentation of the “hot points” (advantages and disadvantages) from the Java Cryptography Architecture (JCA), and more.
The book dives into the classical simple cryptosystems that form the basis of modern cryptography, with fully working solutions (encryption/decryption operations). Pseudo-random generators are discussed as well as real-life implementations. Hash functions are covered along with practical cryptanalysis methods and attacks, asymmetric and symmetric encryption systems, signature and identification schemes.
The book wraps up with a presentation of lattice-based cryptography and the NTRU framework library. Modern encryption schemes for cloud and big data environments (homomorphic encryption and searchable encryption) also are included. After reading and using this book, you will be proficient with crypto algorithms and know how to apply them to problems you may encounter.
What You Will Learn

Develop programming skills for writing cryptography algorithms in Java
Dive into security schemes and modules using Java
Explore “good” vs “bad” cryptography based on processing execution times and reliability
Play with pseudo-random generators, hash functions, etc.
Leverage lattice-based cryptography methods, the NTRU framework library, and more
Who This Book Is For

Those who want to learn and leverage cryptography and cryptanalysis using Java. Some prior Java and/or algorithm programming exposure is highly recommended.

评论可见隐藏内容
此处内容评论后可见

温馨提示:此处为隐藏内容,需要评论或回复留言后可见

评论/回复

OR

付费隐藏内容
此处内容需要权限查看

该内容查看价格:¥5 / VIP会员免费

登录后购买 开通VIP免费查看
分享到 :
相关推荐

发表回复

登录... 后才能评论