Download free for 30 days
Sign in
Upload
Language (EN)
Support
Business
Mobile
Social Media
Marketing
Technology
Art & Photos
Career
Design
Education
Presentations & Public Speaking
Government & Nonprofit
Healthcare
Internet
Law
Leadership & Management
Automotive
Engineering
Software
Recruiting & HR
Retail
Sales
Services
Science
Small Business & Entrepreneurship
Food
Environment
Economy & Finance
Data & Analytics
Investor Relations
Sports
Spiritual
News & Politics
Travel
Self Improvement
Real Estate
Entertainment & Humor
Health & Medicine
Devices & Hardware
Lifestyle
Change Language
Language
English
Español
Português
Français
Deutsche
Cancel
Save
Submit search
EN
Uploaded by
Ana-Maria Mihalceanu
490 views
Secure Java Applications against Quantum Threats
Technology
◦
Read more
1
Save
Share
Embed
Embed presentation
Download
Downloaded 24 times
1
/ 26
2
/ 26
3
/ 26
4
/ 26
5
/ 26
6
/ 26
7
/ 26
8
/ 26
9
/ 26
10
/ 26
11
/ 26
12
/ 26
13
/ 26
14
/ 26
15
/ 26
16
/ 26
17
/ 26
18
/ 26
19
/ 26
Most read
20
/ 26
21
/ 26
Most read
22
/ 26
23
/ 26
24
/ 26
25
/ 26
26
/ 26
Most read
More Related Content
PDF
Emily Stamm - Post-Quantum Cryptography
by
CSNP
PDF
Sullivan randomness-infiltrate 2014
by
Cloudflare
PPTX
Post-Quantum Encryption (PQE) refers to cryptographic algorithms and protocols
by
Rod Medallon
PPTX
Post Quantum Encryption Presentation by srm.pptx
by
Rod Medallon
PDF
Fundamentals and Frontiers of Post Quantum Cryptography
by
Gokul Alex
PPTX
How to do Cryptography right in Android Part One
by
Arash Ramez
PDF
CNIT 141: 14. Quantum and Post-Quantum
by
Sam Bowne
PDF
Practical introduction to quantum-safe cryptography.pdf
by
hassanpak30
Emily Stamm - Post-Quantum Cryptography
by
CSNP
Sullivan randomness-infiltrate 2014
by
Cloudflare
Post-Quantum Encryption (PQE) refers to cryptographic algorithms and protocols
by
Rod Medallon
Post Quantum Encryption Presentation by srm.pptx
by
Rod Medallon
Fundamentals and Frontiers of Post Quantum Cryptography
by
Gokul Alex
How to do Cryptography right in Android Part One
by
Arash Ramez
CNIT 141: 14. Quantum and Post-Quantum
by
Sam Bowne
Practical introduction to quantum-safe cryptography.pdf
by
hassanpak30
Similar to Secure Java Applications against Quantum Threats
PDF
Modern Cryptography
by
James McGivern
PDF
Lec 4 Public Key Cryptography & Digital Identity 2022f.pdf
by
junaidkhalid631
PPT
Java Crypto
by
phanleson
PPT
Security via Java
by
Bahaa Zaid
PDF
CNIT 141: 14. Quantum and Post-Quantum
by
Sam Bowne
PPTX
Public_Key_Cryptography_Diagram_Presentation.pptx
by
KarthikRajaK7
PDF
Post Quantum Cryptography: Technical Overview
by
Ramesh Nagappan
PDF
BlueHat v18 || Record now, decrypt later - future quantum computers are a pre...
by
BlueHat Security Conference
PPTX
CryptoGraphy Module in Mulesoft
by
shyamraj55
PDF
Open Source Post-Quantum Cryptography - Matt Caswell
by
All Things Open
PPT
New ppt.ppt
by
ssuser4030a8
PDF
Post Quantum Cryptography - Emerging Frontiers
by
Gokul Alex
PDF
WEEK-2 (1).pdfdccccccccccccccccccccccccccccccccccc
by
deepak123mastermind
PPT
RSA
by
bansidhar11
ODP
Network Security Topic 4 cryptography2
by
Khawar Nehal khawar.nehal@atrc.net.pk
PPTX
Quantum cryptography by Girisha Shankar, Sr. Manager, Cisco
by
Vishnu Pendyala
PDF
Quantum_Safe_Crypto_Overview_v3.pdf
by
RonSteinfeld1
PPTX
Soumya Das post quantum crypot algorithm
by
soumyadastue
PPTX
post Quantum crypto alogorthm for beginer
by
soumyadastue
PDF
Quantum Knowledge Proofs and Post Quantum Cryptography - A Primer
by
Gokul Alex
Modern Cryptography
by
James McGivern
Lec 4 Public Key Cryptography & Digital Identity 2022f.pdf
by
junaidkhalid631
Java Crypto
by
phanleson
Security via Java
by
Bahaa Zaid
CNIT 141: 14. Quantum and Post-Quantum
by
Sam Bowne
Public_Key_Cryptography_Diagram_Presentation.pptx
by
KarthikRajaK7
Post Quantum Cryptography: Technical Overview
by
Ramesh Nagappan
BlueHat v18 || Record now, decrypt later - future quantum computers are a pre...
by
BlueHat Security Conference
CryptoGraphy Module in Mulesoft
by
shyamraj55
Open Source Post-Quantum Cryptography - Matt Caswell
by
All Things Open
New ppt.ppt
by
ssuser4030a8
Post Quantum Cryptography - Emerging Frontiers
by
Gokul Alex
WEEK-2 (1).pdfdccccccccccccccccccccccccccccccccccc
by
deepak123mastermind
RSA
by
bansidhar11
Network Security Topic 4 cryptography2
by
Khawar Nehal khawar.nehal@atrc.net.pk
Quantum cryptography by Girisha Shankar, Sr. Manager, Cisco
by
Vishnu Pendyala
Quantum_Safe_Crypto_Overview_v3.pdf
by
RonSteinfeld1
Soumya Das post quantum crypot algorithm
by
soumyadastue
post Quantum crypto alogorthm for beginer
by
soumyadastue
Quantum Knowledge Proofs and Post Quantum Cryptography - A Primer
by
Gokul Alex
More from Ana-Maria Mihalceanu
PDF
Writing GPU-Ready AI Models in Pure Java with Babylon
by
Ana-Maria Mihalceanu
PDF
Supercharge Your JVM with Project Leyden
by
Ana-Maria Mihalceanu
PDF
Writing GPU-Ready AI Models in Pure Java with Babylon
by
Ana-Maria Mihalceanu
PDF
Empower Inclusion Through Accessible Java Applications
by
Ana-Maria Mihalceanu
PDF
Java 25 and Beyond - A Roadmap of Innovations
by
Ana-Maria Mihalceanu
PDF
Sécuriser les Applications Java Contre les Menaces Quantiques
by
Ana-Maria Mihalceanu
PDF
Des joyaux de code natif aux trésors Java avec jextract
by
Ana-Maria Mihalceanu
PDF
From native code gems to Java treasures with jextract
by
Ana-Maria Mihalceanu
PDF
Exciting Features and Enhancements in Java 23 and 24
by
Ana-Maria Mihalceanu
PDF
Monitoring Java Application Security with JDK Tools and JFR Events
by
Ana-Maria Mihalceanu
PDF
Enhancing Productivity and Insight A Tour of JDK Tools Progress Beyond Java 17
by
Ana-Maria Mihalceanu
PDF
From native code gems to Java treasures with jextract
by
Ana-Maria Mihalceanu
PDF
Monitoring Java Application Security with JDK Tools and JFR Events
by
Ana-Maria Mihalceanu
PDF
Java 23 and Beyond - A Roadmap Of Innovations
by
Ana-Maria Mihalceanu
PDF
Enhancing Productivity and Insight A Tour of JDK Tools Progress Beyond Java 17
by
Ana-Maria Mihalceanu
PDF
Monitoring Java Application Security with JDK Tools and JFR Events
by
Ana-Maria Mihalceanu
PDF
Java 22 and Beyond- A Roadmap of Innovations
by
Ana-Maria Mihalceanu
PDF
Surveillance de la sécurité des applications Java avec les outils du JDK e...
by
Ana-Maria Mihalceanu
PDF
A Glance At The Java Performance Toolbox
by
Ana-Maria Mihalceanu
PDF
Monitoring Java Application Security with JDK Tools and JFR Events.pdf
by
Ana-Maria Mihalceanu
Writing GPU-Ready AI Models in Pure Java with Babylon
by
Ana-Maria Mihalceanu
Supercharge Your JVM with Project Leyden
by
Ana-Maria Mihalceanu
Writing GPU-Ready AI Models in Pure Java with Babylon
by
Ana-Maria Mihalceanu
Empower Inclusion Through Accessible Java Applications
by
Ana-Maria Mihalceanu
Java 25 and Beyond - A Roadmap of Innovations
by
Ana-Maria Mihalceanu
Sécuriser les Applications Java Contre les Menaces Quantiques
by
Ana-Maria Mihalceanu
Des joyaux de code natif aux trésors Java avec jextract
by
Ana-Maria Mihalceanu
From native code gems to Java treasures with jextract
by
Ana-Maria Mihalceanu
Exciting Features and Enhancements in Java 23 and 24
by
Ana-Maria Mihalceanu
Monitoring Java Application Security with JDK Tools and JFR Events
by
Ana-Maria Mihalceanu
Enhancing Productivity and Insight A Tour of JDK Tools Progress Beyond Java 17
by
Ana-Maria Mihalceanu
From native code gems to Java treasures with jextract
by
Ana-Maria Mihalceanu
Monitoring Java Application Security with JDK Tools and JFR Events
by
Ana-Maria Mihalceanu
Java 23 and Beyond - A Roadmap Of Innovations
by
Ana-Maria Mihalceanu
Enhancing Productivity and Insight A Tour of JDK Tools Progress Beyond Java 17
by
Ana-Maria Mihalceanu
Monitoring Java Application Security with JDK Tools and JFR Events
by
Ana-Maria Mihalceanu
Java 22 and Beyond- A Roadmap of Innovations
by
Ana-Maria Mihalceanu
Surveillance de la sécurité des applications Java avec les outils du JDK e...
by
Ana-Maria Mihalceanu
A Glance At The Java Performance Toolbox
by
Ana-Maria Mihalceanu
Monitoring Java Application Security with JDK Tools and JFR Events.pdf
by
Ana-Maria Mihalceanu
Recently uploaded
PDF
Deploying Windows Clients & Managing Identities
by
VICTOR MAESTRE RAMIREZ
PPT
Database Management Systems: Basics, History, Data Models, etc.
by
Parithi Thamizh
PDF
How the EU Ecolabel's Record Growth Creates ESG Opportunities for CRE
by
Wastify AI
PPTX
Robot Vacuums are Cleaning Up. The global robot vacuum segment has high marke...
by
Robert March
DOCX
Best Web to Learn About Buying Verified Skrill Accounts (Los Angeles).docx
by
https://topsellerit.com/product/buy-verified-binance-accounts/
PDF
MINDCTI Revenue Release Quarter 3 2025 - Financial Presentation
by
MIND CTI
PDF
5G Explained! A High Level Overview [Introduction]
by
Luciano Motta
PDF
What ONIX can do: Leveraging metadata to support the discoverability of First...
by
BookNet Canada
PPTX
Achieve enterprise automation with SAP BTP solutions and SAP Signavio
by
darrellkiwi
PDF
TopMate ES11 3-Wheel Electric Scooter: Comfortable, Stable Mobility for Every...
by
Topmate
PDF
Unlocking Gen AI Capabilities Within UiPath Document Understanding
by
DianaGray10
PDF
Transcript: What ONIX can do: Leveraging metadata to support the discoverabil...
by
BookNet Canada
PDF
Teaching Robots how to Read 1/2: AI Center & Classic Document Understanding (...
by
anabulhac
PDF
Smart Cloud Solutions-Smart,Secure & Scalable
by
floydjsmith02
PDF
Ethical AI applied to publishing: Presenting wâsikan kisewâtisiwin, an AI too...
by
BookNet Canada
PPTX
A CIO’s Guide to Salesforce AI Architecture, Governance, and Implementation R...
by
Kerry Millar
PPTX
CodeMash 2026 - Optimizing Azure App Services
by
Brian McKeiver
PPTX
Migrating-Hadoop-to-Databricks-Ebook-FINAL.pptx
by
ssuserf37fc8
PDF
Introduction to Linux and Basic Commands
by
iDev Semarang
PPTX
AI in Marine Insurance Future of Smarter Risk, Faster Claims & Safer Shipping...
by
AutomationEdge Technologies
Deploying Windows Clients & Managing Identities
by
VICTOR MAESTRE RAMIREZ
Database Management Systems: Basics, History, Data Models, etc.
by
Parithi Thamizh
How the EU Ecolabel's Record Growth Creates ESG Opportunities for CRE
by
Wastify AI
Robot Vacuums are Cleaning Up. The global robot vacuum segment has high marke...
by
Robert March
Best Web to Learn About Buying Verified Skrill Accounts (Los Angeles).docx
by
https://topsellerit.com/product/buy-verified-binance-accounts/
MINDCTI Revenue Release Quarter 3 2025 - Financial Presentation
by
MIND CTI
5G Explained! A High Level Overview [Introduction]
by
Luciano Motta
What ONIX can do: Leveraging metadata to support the discoverability of First...
by
BookNet Canada
Achieve enterprise automation with SAP BTP solutions and SAP Signavio
by
darrellkiwi
TopMate ES11 3-Wheel Electric Scooter: Comfortable, Stable Mobility for Every...
by
Topmate
Unlocking Gen AI Capabilities Within UiPath Document Understanding
by
DianaGray10
Transcript: What ONIX can do: Leveraging metadata to support the discoverabil...
by
BookNet Canada
Teaching Robots how to Read 1/2: AI Center & Classic Document Understanding (...
by
anabulhac
Smart Cloud Solutions-Smart,Secure & Scalable
by
floydjsmith02
Ethical AI applied to publishing: Presenting wâsikan kisewâtisiwin, an AI too...
by
BookNet Canada
A CIO’s Guide to Salesforce AI Architecture, Governance, and Implementation R...
by
Kerry Millar
CodeMash 2026 - Optimizing Azure App Services
by
Brian McKeiver
Migrating-Hadoop-to-Databricks-Ebook-FINAL.pptx
by
ssuserf37fc8
Introduction to Linux and Basic Commands
by
iDev Semarang
AI in Marine Insurance Future of Smarter Risk, Faster Claims & Safer Shipping...
by
AutomationEdge Technologies
Secure Java Applications against Quantum Threats
1.
Secure Java Applications Against
Quantum Threats Ana-Maria Mihalceanu Senior Java Developer Advocate @ Oracle https://bsky.app/profile/ammbra1508.bsky.social https://mastodon.social/@ammbra1508 https://twitter.com/ammbra1508
2.
Goals Understand the urgency for
advancing quantum cryptography Explore solutions and standards Leverage JDK security to build resilient applications 2 Copyright © 2025, Oracle and/or its affiliates
3.
Why Quantum Cryptography Matters
Now ?
4.
Data Incident Involving
Your Personal Information “ We’re writing to inform you that some of your personal data shared with one of our contractors was involved in a recent security incident. The data was encrypted using industry-standard cryptographic methods. While the encrypted files were accessed by an unauthorized party, they remain undecipherable. We are actively investigating and reinforcing our systems for added protection. You do not need to take any action at this time, but we remain available for any questions.” 4 Copyright © 2025, Oracle and/or its affiliates
5.
The Math Behind
ECC Standard Elliptic Curve Cryptography (ECC) is a modern cryptographic approach based on the algebraic structure of elliptic curves over finite fields. y2=x3+ax+b mod p where a,b∈𝐹p and 4a3+27b2≠0 Finite Fields (Fp) Finite Fields operations are done modulo a prime p. 5 Copyright © 2025, Oracle and/or its affiliates Elliptic Curve Equation
6.
Copyright © 2025,
Oracle and/or its affiliates 6 Smaller Keys 256-bit ECC ≈ 3072-bit RSA Fast Calculations Faster computations and reduced resource usage. ECDSA Elliptic Curve Digital Signature Algorithm ECDH Elliptic Curve Diffie- Hellman for Secure Key Exchange Cryptographic Applications
7.
Harvest now, Decrypt
Later 7 Copyright © 2025, Oracle and/or its affiliates Source: https://pixabay.com/photos/keyboard-hands-hacker-hack-4356763/
8.
The Power of
Quantum Computers https://www.quantamagazine.org/john-preskill-explains- quantum-supremacy-20191002 https://cloudsecurityalliance.org/research/working- groups/quantum-safe-security 8 Copyright © 2025, Oracle and/or its affiliates | Confidential: Internal/Restricted/Highly Restricted
9.
A New Mathematical
Approach 9 Copyright © 2025, Oracle and/or its affiliates | Confidential: Internal/Restricted/Highly Restricted L={a⋅b1+b⋅b2 ∣ a,b ∈ 𝕫 }
10.
Copyright © 2025,
Oracle and/or its affiliates 10 Lattice A lattice is a discrete grid of points in ℝn, defined as integer combinations of linearly independent vectors. Module Lattice A module lattice generalizes this over polynomial rings. Lattice-Based KEMs Lattice-based KEMs rely on mathematical problems such as Learning With Errors or Ring Learning With Errors. NP-Hard These are NP- hard problems for quantum computers. Math Behind Module-Lattice Based Cryptography
11.
Growing Interest for
Quantum Resistant Cryptography 11 Copyright © 2025, Oracle and/or its affiliates Source: https://media.defense.gov/2022/Sep/07/2003071836/-1/-1/0/CSI_CNSA_2.0_FAQ_.PDF
12.
Towards (Post) Quantum Cryptography
13.
Hybrid Public Key
Encryption (HPKE) A new standard for public-key encryption that lets a sender encrypt arbitrary-length messages under a receiver’s public key. Can be either for pre-quantum or post-quantum secure communication. 13 Copyright © 2025, Oracle and/or its affiliates
14.
“HPKE works for
any combination of an asymmetric KEM, key derivation function (KDF), and authenticated encryption with additional data (AEAD) encryption function.” RFC 9180 on Hybrid Public Key Encryption 14 Copyright © 2025, Oracle and/or its affiliates
15.
Forward Thinking Security
Standards FIPS 203 A standard for general encryption, based on ML-KEM. FIPS 204 The primary standard for protecting digital signatures, based on ML-DSA. FIPS 205 Stateless Hash-Based Digital Signature Standard 15 Copyright © 2025, Oracle and/or its affiliates Source: https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards
16.
Advancing JDK Security Copyright
© 2025, Oracle and/or its affiliates 16 JEP 452: Key Encapsulation Mechanism API JDK 21 • JEP 478: Key Derivation Function API (Preview) • JEP 496: Quantum-Resistant Module-Lattice-Based Key Encapsulation Mechanism • JEP 497: Quantum-Resistant Module-Lattice-Based Digital Signature Algorithm JEP 510: Key Derivation Function API JDK 25 JDK 24
17.
Helpful JDK Tools
18.
Generate ML-KEM Key
Pairs with Keytool (Example) 18 Copyright © 2025, Oracle and/or its affiliates # generates a certificate signed with EC keytool -genkeypair -alias $SERVER_ALIAS -keyalg ec -validity 365 -keystore server.p12 -storepass $PASSWORD -keypass $PASSWORD # generate the ML-KEM key pair keytool -keystore server.p12 -storepass $PASSWORD -genkeypair -alias server-mlkem -keyalg ML-KEM-768 -signer $SERVER_ALIAS
19.
Generate ML-DSA Key
Pairs with Keytool (Example) 19 Copyright © 2025, Oracle and/or its affiliates keytool -genkeypair -alias server-mldsa -keyalg ML-DSA-44 -validity 365 -keystore server.p12 -storepass $PASSWORD -keypass $PASSWORD # or provide the parameter-set name, ML-DSA-44, directly via the -keyalg option: keytool -genkeypair -alias server-mldsa -keyalg ML-DSA -groupname ML-DSA-44 -validity 365 -keystore server.p12 -storepass $PASSWORD -keypass $PASSWORD
20.
Capture Relevant Details
About X.509 Certificates with JFR 20 Copyright © 2025, Oracle and/or its affiliates # enable jdk.X509Certificate and jdk.X509Validation options in your JFR config file <event name="jdk.X509Certificate"> <setting name="enabled">true</setting> <setting name="stackTrace">true</setting> </event> <event name="jdk.X509Validation"> <setting name="enabled">true</setting> <setting name="stackTrace">true</setting> </event> # or run jfr configure command in a terminal window $JAVA_HOME/bin/jfr configure jdk.X509Certificate#enabled=true jdk.X509Validation#enabled=true
21.
Inspect Successful TLS
Handshakes 21 Copyright © 2025, Oracle and/or its affiliates # start a recording jcmd llvmid JFR.start duration=60s filename=/tmp/TLS.jfr # use jfr print command $JAVA_HOME/bin/jfr print --events "TLS*" /tmp/TLS.jfr jdk.TLSHandshake { ... peerHost = "google.com" peerPort = 8443 protocolVersion = "TLSv1.3" cipherSuite = "TLS_AES_128_GCM_SHA256" ... }
22.
Don’t Forget to
Scrub Sensitive Data 22 Copyright © 2025, Oracle and/or its affiliates # Filter data from the specified recording file. jfr scrub [filters] [recording-file] [output-file] # Supply which events to include. jfr scrub --include-events jdk.X509Certificate,jdk.X509Validation rec.jfr # Include a category and exclude events. jfr scrub --include-categories Security --exclude-events jdk.X509Validation rec.jfr # Remove all events by category jfr scrub --exclude-categories Security rec.jfr
23.
What’s Next for
You? Audit your encrypted assets. Take care of your application by updating it to a recent JDK. Don’t assume encrypted = safe (forever). 23 Copyright © 2025, Oracle and/or its affiliates
24.
Stay Tuned For
More! 24 Copyright © 2025, Oracle and/or its affiliates inside.java youtube.com/java dev.java
25.
Demo Code 25 Copyright
© 2025, Oracle and/or its affiliates
26.
Thank you Copyright ©
2025, Oracle and/or its affiliates 26
Download