O'Reilly logo

Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java by David Coffin

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Java Methods for Secret Password Decryption

Once we've called the appsec procedures to get the DES secret password key artifacts and encrypted data back to the client, we need to

1) decrypt the artifacts with the RSA private key

2) generate the DES secret password key

3) decrypt the data with the secret password key

As a rule, I try to limit the number of steps that I require of developers to accomplish work. Why make a developer call three methods when they can call a single method that accomplishes the other calls for them? The application developer's goal is to decrypt data, so we provide a method for them to do just that.

images Note You can find ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required