Your SlideShare is downloading. ×
  • Like
Java cryptography architecture
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Now you can save presentations on your phone or tablet

Available for both IPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Java cryptography architecture

  • 772 views
Published

Java Architecture and Cryptography

Java Architecture and Cryptography

Published in Education , Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
772
On SlideShare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
49
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. JAVA CRYPTOGRAPHY ARCHITECTURE 1 Submitted by:TUFAIL KHAN-100101246 VARUN-1001011254
  • 2. CRYPTOGRAPHY  Hidden writing  Used to protect information  Can ensure confidentiality o Integrity and Authenticity too cont.. 2
  • 3.  Cryptography -: to achieve encoding messages to make them no-readable. ……… 3
  • 4.  Cryptanalysis-: technique of decode no-readable into readable. .... 4
  • 5.  Cryptology-: combination of cryptography and cryptanalysis. 5
  • 6. BASIC CRYPTOGRAPHIC FUNCTIONS Private/Public Key Pair Generation  Secret Key Generation  Hash Functions  Digital Signatures  Random Number Generation  Encryption/Decryption  6
  • 7. SECRET, PUBLIC KEY CRYPTOGRAPHY AND HASH FUNCTIONS Secret Key Cryptography (SKC): Uses a single key for both encryption and decryption  Public Key Cryptography (PKC): Uses one key for encryption and another for decryption  Hash Functions: Uses a mathematical transformation to irreversibly "encrypt" information  7
  • 8. 8
  • 9. ADVANTAGES OF JAVA IN CRYPTOGRAPHY Develop programs more quickly  Avoid platform dependencies  Write once, run anywhere  Distribute software more easily  9
  • 10. JAVA CRYPTOGRAPHIC TWO MAIN TECHNOLOGIES- Java Cryptographic Architecture (JCA) - It is a set of classes that provide cryptographic capabilities to java programs.  Java cryptographic Extension (JCE)- Whereas JCE is not the part of core Java JDK. For this request special licensing.  10
  • 11. JAVA CRYPTOGRAPHIC ARCHITECTURE JCA is the part of core java framework.  Security API in JDK 1.1 introduced the JCA.  It’s provide the basic cryptographic functionalities to programmer using java language.  Cryptographic functionalities such as- access control, permissions, key pairs, message digests and digital signatures.  In order to achieve this, the JCA package consists of a number of classes, called as engine classes.  11
  • 12. ENGINE CLASSES It is a logical representation of cryptographic functionality.  Such as:Message digest Digital signature Key generator Random number  12
  • 13. ENGINE CLASS 13
  • 14. TYPES OF ENGINE CLASSES 14
  • 15. SIGNATURE CLASS public abstract class Signature extends SignatureSpi  Used to provide applications the functionality of a digital signature algorithm  Provides implementation independent algorithms  There are two ways to request a signature algorithm object:  Specifying an algorithm name  Specifying both algorithm name and package provider 15
  • 16. DIGITAL SIGNATURE Public key cryptography is also used to provide digital signatures. signing plaintext signed message private key signed message verification plaintext public key 16
  • 17. KEYSTORE Manage secret keys, key pairs and digital certificates  A password-protected database   stores private key and its associated public key certificate  Can contain trusted certificates  Each entry is identified by an alias  An alias may identify the purpose of the key. i.e. signMyEmails 17
  • 18. MESSAGE DIGEST public abstract class MessageDigest extends MessageDigestSpi Also known as “hash function” or “one-way transformation”. Transforms a message of any length and computes a fixed length string. We want it to be hard to guess what the message was given only the digest.  Guessing is always possible. 18
  • 19. MESSAGE DIGEST 19
  • 20. ENCRYPTING DATA  This class is called as Cipher class  Javax.cryptro.Cipher It provides an interface to encrypt and decrypt data either in arrays within the program or as that data is read or written through Java’s stream interfaces 20
  • 21. ENCRYPTION Encryption is the process of feeding plaintext and key into a function and getting ciphertext output  Ciphertext is “garbage” unless decrypted  Plaintext Encryption Function 21
  • 22. DECRYPTION  Decryption is the process of feeding ciphertext and a key into another function and getting original plaintext output Decryption Function Plaintext 22
  • 23. RANDOM NUMBER GENERATOR  It is used to create cryptographic keys and in some cases to encrypt or sign data.  Its value could not be predicted  PRNG(Pseudo Random Number Generator) is used by computers to generate endless sequence of random numbers 23
  • 24. THANK YOU!!!!! 24