Summary

In this chapter, we introduced several Java approaches to secure communications between applications. We started with a brief introduction to security-related terms and followed the introduction with a more detailed discussion later.

There are two common encryption/decryption approaches that are used today. The first is symmetric key encryption, which uses a single key that is shared between the applications. This approach requires that the key be transmitted between the applications in a secure fashion.

The second approach uses asymmetric encryption. This technique uses a private and a public key. A message encrypted with one of these keys can be decrypted with the other key. Normally, the public key is distributed using a certificate from ...

Get Learning Network Programming with Java now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.