Cart
Free Shipping in Australia
Proud to be B-Corp

Cryptography and Cryptanalysis in Java Stefania Loredana Nita

Cryptography and Cryptanalysis in Java By Stefania Loredana Nita

Cryptography and Cryptanalysis in Java by Stefania Loredana Nita


$96.79
Condition - New
Only 3 left

Summary

Intermediate user level

Cryptography and Cryptanalysis in Java Summary

Cryptography and Cryptanalysis in Java: Creating and Programming Advanced Algorithms with Java SE 17 LTS and Jakarta EE 10 by Stefania Loredana Nita

Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 17 and Jakarta EE 10. It provides a robust introduction to Java 17's new features and updates, a roadmap for Jakarta EE 10 security mechanisms, a unique presentation of the hot points (advantages and disadvantages) from the Java Cryptography Architecture (JCA), and more.

The book dives into the classical simple cryptosystems that form the basis of modern cryptography, with fully working solutions (encryption/decryption operations). Pseudo-random generators are discussed as well as real-life implementations. Hash functions are covered along with practical cryptanalysis methods and attacks, asymmetric and symmetric encryption systems, signature and identification schemes.

The book wraps up with a presentation of lattice-based cryptography and the NTRU framework library. Modern encryption schemes for cloud and big data environments (homomorphic encryption and searchable encryption) also are included. After reading and using this book, you will be proficient with crypto algorithms and know how to apply them to problems you may encounter.

What You Will Learn

  • Develop programming skills for writing cryptography algorithms in Java
  • Dive into security schemes and modules using Java
  • Explore good vs bad cryptography based on processing execution times and reliability
  • Play with pseudo-random generators, hash functions, etc.
  • Leverage lattice-based cryptography methods, the NTRU framework library, and more

Who This Book Is For

Those who want to learn and leverage cryptography and cryptanalysis using Java. Some prior Java and/or algorithm programming exposure is highly recommended.

About Stefania Loredana Nita

Stefania Loredana Nita, PhD, is a software developer at the Institute of Computer Science of the Romanian Academy and a PhD with her thesis on advanced cryptographic schemes using searchable encryption and homomorphic encryption. She has served more than two years as an assistant lecturer at the University of Bucharest where she taught courses on subjects such as advanced programming techniques, simulation methods, and operating systems. She has authored and co-authored more than 15 work papers for conferences and journals, and has authored two books on he Haskell programming language. She is a lead guest editor for special issues on information security and cryptography such as advanced cryptography and its future: searchable and homomorphic encryption. She holds an MSc in software engineering and two BSc in computer science and mathematics.
Marius Iulian Mihailescu, PhD is CEO at Dapyx Solution Ltd., a company based in Bucharest, Romania. He is involved in information security- and cryptography-related research projects. He is a lead guest editor for applied cryptography journals and a reviewer for multiple publications with information security and cryptography profiles. He authored and co-authored more than 30 articles for conference proceedings, 25 articles in journals, and three books. For more than six years he has served as a lecturer at well-known national and international universities (University of Bucharest, Titu Maiorescu University, Kadir Has University in, Istanbul, Turkey). He has taught courses on programming languages (C#, Java, C++, Haskell), and object-oriented system analysis and design with UML, graphs, databases, cryptography, and information security. He served for three years as IT officer at Royal Caribbean Cruises Ltd. where he dealt with IT infrastructure, data security, and satellite communications systems. He received his PhD in 2014 and his thesis was on applied cryptography over biometric data. He holds two MSc in information security and software engineering.

Table of Contents

Chapter 01 - IntroductionChapter 02 - JDK 17: Java 17 New FeaturesChapter 03 - Road to Jakarta EE10 and Security MechanismsChapter 04 - Java Cryptography Architecture (java.security.*)Chapter 05 - Classical Cryptography5.1. Some Simple Cryptosystems5.1.1. Shift Cipher (Caesar)5.1.2. Substitution Cipher5.1.3. Affine Cipher5.1.4. Vigenere Cipher5.1.5. Hill Cipher5.1.6. Transposition Cipher5.1.7. Columnar Transposition Cipher5.1.8. Rail Fence Cipher5.1.9. Stream Ciphers5.2. Cryptanalysis 5.2.1. Cryptanalysis of Caesar 5.2.2. Cryptanalysis of Affine Cipher 5.2.3. Cryptanalysis of Substitution Cipher 5.2.4. Cryptanalysis of Vigenere Cipher 5.2.5. Known Plaintext Attack on the Hill CipherChapter 06. Formal Techniques for Cryptography 6.1. Galois Fields 6.2. Elliptic CurvesChapter 07. Pseudo-random GeneratorsChapter 08. Hash Functions8.1. MessageDigest Java Class8.2. Common Hash Functions 8.2.1. SHA-3 Keccak Hash Functions 8.2.2. SHA-2 Cryptography Hash Functions Family 8.2.2.1. SHA-512 8.2.2.2. SHA-384 8.2.2.3. SHA-256 8.2.2.4. SHA-224 8.2.3. MD Hash Functions 8.2.3.1. MD2 8.2.3.2. MD4 8.2.3.3. MD5 8.2.3.4. MD6 8.2.4. RIPEMD 8.2.5. SWIFT 8.2.6. WHIRLPOOL 8.2.7. BLAKE 8.2.8. Collisions Hash Functions 8.2.9. Birthday AttackChapter 09 - Symmetric Encryption Algorithms9.1. Case Study: The Data Encryption Standard (DES) 9.1.1. Linear and Differential Cryptanalysis for DES9.2. Advanced Encryption Standard (AES)Chapter 10 - Asymmetric Encryption Schemes10.1. RSA10.2. El Gamal 10.3. Merkle-Hellman Knapsack System10.4. McEliece SystemChapter 11 - Signature Schemes 11.1. Digital Signature Standard 11.2. El Gamal Signature 11.3. Undeniable SignaturesChapter 12 - Identification SchemesChapter 13 - Lattice-based Cryptography and NTRUChapter 14 - Modern/Advanced Encryption Schemes 14.1. Homomorphic Encryption 14.2. Searchable EncryptionChapter 15 - Cryptography Tools

Additional information

NGR9781484281048
9781484281048
1484281047
Cryptography and Cryptanalysis in Java: Creating and Programming Advanced Algorithms with Java SE 17 LTS and Jakarta EE 10 by Stefania Loredana Nita
New
Paperback
APress
2022-04-16
227
N/A
Book picture is for illustrative purposes only, actual binding, cover or edition may vary.
This is a new book - be the first to read this copy. With untouched pages and a perfect binding, your brand new copy is ready to be opened for the first time

Customer Reviews - Cryptography and Cryptanalysis in Java