概要
- 最新かつわかりやすいJavaでCryptographyコーディング
Table of Contents
Chap1. CRYPTOGRAPHIC INTRODUCTION
- The Course Overview
- Goals of Cryptography and Where It Is Used
- History of Cryptography and Why You Shouldn’t Build New Algorithms
- The Architectural Layout of Modern Cryptography
- Concepts That Will Be Important Later
Chap2. BASIC CIPHERS
- Symmetric Ciphers and Where They Are Used
- Basic Encryption with Symmetric Ciphers
- Hashing and MessageDigest For Validations
- Common Security Flaws When Using Symmetric Ciphers
Chap3. ADVANCED CIPHERS, ASYMMETRIC, AND PUBLIC KEY
- Asymmetric Ciphers and Where They Are Used
- Creating A KeyPairGenerator Instance
- Storing the Java KeyStore
- Java KeyTool
- Creating A KeyGenerator Instance
- Basic Encryption with Asymmetric Ciphers
- What to Do When PKIX Validation Fails
- Java Certificate Chains
- The Key Escrow Problem
Chap4. HACKING TECHNIQUES – BREAKING AND BYPASSING
- Using Unique Keys and Certificates
- Certificate Pinning
- Signed JAR Files
- Token Harvesting
- When and How to Upgrade Algorithms
- Standard Decompilation Tools
Chap5. PUTTING IT ALL TOGETHER
- Encrypting and Decrypting Files
- Obtaining Certificates from LetsEncrypt or AWS
- Qualys SSL Labs for Your Servers
- The DeepViolet Security Analyzer