Implementing secure RSA cryptosystems using your own cryptographic JCE provider

Loading...
Thumbnail Image

Date

Journal Title

Journal ISSN

Volume Title

Publisher

Access Rights

info:eu-repo/semantics/closedAccess

Abstract

Today and without a doubt, we live in a net-centric world in which new information technologies arrive at lightning speed, allowing us to share information locally to globally faster than ever before. The bad guys are equally out there to eavesdrop on our data transactions over the insecure communication channels. Cryptography can be used to help us secure our data communication. In this study we describe a Java implementation of secure RSA cryptosystems using your cryptographic provider, Java Cryptographic Extension (JCE). We then illustrate the use of this implementation in a working prototype. We then explain the naïve procedure for implementation of RSA cryptosystems and signature algorithm followed by the real time Java implementation using Open Source Bouncy Castle JCE provider. © 2006 Asian Network for Scientific Information.

Description

Keywords

Authentication, Confidentiality, Cryptography, DH, Digital signature, DLP, DSA, ECC, ElGamal, Integrity, Java, JCA, JCE, Public and private keys, RSA, SSL

Journal or Series

Journal of Applied Sciences

WoS Q Value

Scopus Q Value

Volume

6

Issue

3

Citation

Endorsement

Review

Supplemented By

Referenced By