Smart Card Guy

Smart Card / Java Card, Cyber Security, IoT Device Security, Root of Trust, 標準化等

洋書 (Video) - Hands-On Cryptography with Java

learning.oreilly.com

概要

  • 最新かつわかりやすいJavaでCryptographyコーディング

Table of Contents

Chap1. CRYPTOGRAPHIC INTRODUCTION

  • The Course Overview
  • Goals of Cryptography and Where It Is Used
  • History of Cryptography and Why You Shouldn’t Build New Algorithms
  • The Architectural Layout of Modern Cryptography
  • Concepts That Will Be Important Later

Chap2. BASIC CIPHERS

  • Symmetric Ciphers and Where They Are Used
  • Basic Encryption with Symmetric Ciphers
  • Hashing and MessageDigest For Validations
  • Common Security Flaws When Using Symmetric Ciphers

Chap3. ADVANCED CIPHERS, ASYMMETRIC, AND PUBLIC KEY

  • Asymmetric Ciphers and Where They Are Used
  • Creating A KeyPairGenerator Instance
  • Storing the Java KeyStore
  • Java KeyTool
  • Creating A KeyGenerator Instance
  • Basic Encryption with Asymmetric Ciphers
  • What to Do When PKIX Validation Fails
  • Java Certificate Chains
  • The Key Escrow Problem

Chap4. HACKING TECHNIQUES – BREAKING AND BYPASSING

  • Using Unique Keys and Certificates
  • Certificate Pinning
  • Signed JAR Files
  • Token Harvesting
  • When and How to Upgrade Algorithms
  • Standard Decompilation Tools

Chap5. PUTTING IT ALL TOGETHER

  • Encrypting and Decrypting Files
  • Obtaining Certificates from LetsEncrypt or AWS
  • Qualys SSL Labs for Your Servers
  • The DeepViolet Security Analyzer

Source files

その他リンク

Java Documentation Link