Chapter Review

Perhaps this was a lot of ground to cover in a few short pages, but there wasn't a lot of code required. I think you'll agree that if this is all that's required to do Public Key Encryption, we should all be doing it!

Here is a list of PKE-related steps we took:

  • Created the public and private key set.
  • Got the modulus and exponent of the public key.
  • Re-created the public key from the modulus and exponent.
  • Generated an appropriate Cipher.
  • Initialized the Cipher to do encryption or decryption using either the public or private key.
  • Called the Cipher.doFinal() method to do both encryption and decryption.

In addition to the PKE aspects, we learned about the Serializable interface and about how we can serialize objects to pass them ...

Get Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.