Implementing secure RSA cryptosystems using your own cryptographic JCE provider

dc.contributor.authorRabah, Kefa V.O.
dc.date.accessioned2026-02-06T17:59:07Z
dc.date.issued2006
dc.departmentDoğu Akdeniz Üniversitesi
dc.description.abstractToday and without a doubt, we live in a net-centric world in which new information technologies arrive at lightning speed, allowing us to share information locally to globally faster than ever before. The bad guys are equally out there to eavesdrop on our data transactions over the insecure communication channels. Cryptography can be used to help us secure our data communication. In this study we describe a Java implementation of secure RSA cryptosystems using your cryptographic provider, Java Cryptographic Extension (JCE). We then illustrate the use of this implementation in a working prototype. We then explain the naïve procedure for implementation of RSA cryptosystems and signature algorithm followed by the real time Java implementation using Open Source Bouncy Castle JCE provider. © 2006 Asian Network for Scientific Information.
dc.identifier.doi10.3923/jas.2006.482.510
dc.identifier.endpage510
dc.identifier.issn1812-5654
dc.identifier.issue3
dc.identifier.scopus2-s2.0-33646264791
dc.identifier.scopusqualityN/A
dc.identifier.startpage482
dc.identifier.urihttps://doi.org/10.3923/jas.2006.482.510
dc.identifier.urihttps://search.trdizin.gov.tr/tr/yayin/detay/
dc.identifier.urihttps://hdl.handle.net/11129/7916
dc.identifier.volume6
dc.indekslendigikaynakScopus
dc.language.isoen
dc.relation.ispartofJournal of Applied Sciences
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı
dc.rightsinfo:eu-repo/semantics/closedAccess
dc.snmzKA_Scopus_20260204
dc.subjectAuthentication
dc.subjectConfidentiality
dc.subjectCryptography
dc.subjectDH
dc.subjectDigital signature
dc.subjectDLP
dc.subjectDSA
dc.subjectECC
dc.subjectElGamal
dc.subjectIntegrity
dc.subjectJava
dc.subjectJCA
dc.subjectJCE
dc.subjectPublic and private keys
dc.subjectRSA
dc.subjectSSL
dc.titleImplementing secure RSA cryptosystems using your own cryptographic JCE provider
dc.typeArticle

Files