Summary

  

The purpose of this chapter was not to add ciphers, algorithms, or keys to the JDK, but to understand how existing interfaces to ciphers and frameworks can be used. An infrastructure for how ciphers can be used was introduced, along with the smart card, which is a device that uses keys and ciphers to hide keys.

The smart card is a portable device that can be used to protect a larger device. For example, a laptop with the correct application and smart card reader could require the smart card before startup or otherwise it won't start up. By having the smart card reader tied directly in the laptop through a serial port, a new form of physical security is used. The key cannot be sniffed off of the laptop, because the key could be stored on the smart card. The key cannot be sniffed off of the network because the key only travels through the serial cable. If the laptop is stolen, the missing piece needed to start the laptop should be kept in the user 's wallet.

Other concepts that were introduced in this chapter were the PBE, which is a method to turn a non-secure password into a secure key by salting it and iteratively digesting it. Blowfish was introduced in this chapter because it is one of the most popular ciphers. PBE and Blowfish come out of the box in the JDK 1.4 and can be used free of charge with very little work.

  


Java Security Solutions
Java Security Solutions
ISBN: 0764549286
EAN: 2147483647
Year: 2001
Pages: 222

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net