Chapter Review
Perhaps this was a lot of ground to cover in a few short pages, but there wasn't a lot of code required. I think you'll agree that if this is all that's required to do Public Key Encryption, we should all be doing it!
Here is a list of PKE-related steps we took:
- Created the public and private key set.
- Got the modulus and exponent of the public key.
- Re-created the public key from the modulus and exponent.
- Generated an appropriate
Cipher.
- Initialized the
Cipher
to do encryption or decryption using either the public or private key. - Called the
Cipher.doFinal()
method to do both encryption and decryption.
In addition to the PKE aspects, we learned about the Serializable
interface and about how we can serialize objects to pass them ...
Get Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.