Nita et al., 2024 - Google Patents
Java Cryptography ArchitectureNita et al., 2024
- Document ID
- 11979079248241055579
- Author
- Nita S
- Mihailescu M
- Publication year
- Publication venue
- Cryptography and Cryptanalysis in Java: Creating and Programming Advanced Algorithms with Java SE 21 LTS and Jakarta EE 11
External Links
Snippet
Abstract The Java Cryptography Architecture (JCA) framework offers capabilities for working with cryptography algorithms and offers methods for a variety of cryptography primitives. JCA was introduced as part of the Java Development Kit (JDK) and offers a framework and …
- 238000000034 method 0 abstract description 37
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Barker | Guideline for using cryptographic standards in the federal government: Cryptographic mechanisms | |
| Kostiainen et al. | On-board credentials with open provisioning | |
| US20220114249A1 (en) | Systems and methods for secure and fast machine learning inference in a trusted execution environment | |
| US7516321B2 (en) | Method, system and device for enabling delegation of authority and access control methods based on delegated authority | |
| US20200412548A1 (en) | Code signing method and system | |
| US8495383B2 (en) | Method for the secure storing of program state data in an electronic device | |
| US20080165970A1 (en) | runtime mechanism for flexible messaging security protocols | |
| Giereth | On partial encryption of rdf-graphs | |
| US11640480B2 (en) | Data message sharing | |
| Halpin | The W3C web cryptography API: motivation and overview | |
| Zubair et al. | A hybrid algorithm-based optimization protocol to ensure data security in the cloud | |
| Barker | Cryptographic Standards in the Federal Government: Cryptographic Mechanisms | |
| Braune et al. | Evaluation of OPC UA secure communication in web browser applications | |
| Chaudhary et al. | A security solution for the transmission of confidential data and efficient file authentication based on DES, AES, DSS and RSA | |
| Nita et al. | Java Cryptography Architecture | |
| Müller et al. | Post-quantum XML and SAML Single Sign-On | |
| Nita et al. | Java Cryptography Architecture | |
| CN113987537A (en) | A KDM production method and system based on national secret algorithm | |
| Asad et al. | Working with cryptography | |
| Easttom | SSL/TLS | |
| Martin | Cryptographic controls: The heart of cybersecurity | |
| Mihailescu et al. | Cryptography Libraries in C# and. NET | |
| Nita et al. | Lattice-Based Cryptography and NTRU | |
| Raj et al. | Performance Analysis of Hybrid Cryptographic Algorithms in Serverless Platforms | |
| Siriwardena | JWT, JWS, and JWE |