Bouncycastle JCE Practice (1) Select Blog from HONGBO781202

xiaoxiao2021-03-17  190

Java security architecture analysis

The figure below shows the standard components of the Java security architecture. In the lower half of the figure, the core of the Java2 security architecture is the core and Java encryption architecture (JAVA, Java Cryptography Architecture), which constitutes a Java2 security platform belled in the Java2 platform. In the upper part of the figure, Java security extensions independent of Java2 platform and different aspects of the Java2 platform.

As can be seen from the above figure, the Java platform provides two sets of APIs: JCA and JCE for security and encryption services. JAVA CRYPTOGRAPHY ARCHITECTURE provides basic encryption frameworks such as certificates, digital signature, message summary, and key pair generators; JCE is extended on the basis of JCA, including encryption algorithms, key exchange, key generation, and messages. Identification service and other interfaces.

JCA and JCE JCA / JCE do not perform various algorithms, which is just a set of interfaces for connecting applications and actual algorithms. Software developers are implemented in accordance with the JCE interface, packing into a provike, which can be dynamically added to the Java operating environment. Due to the US export control regulations, JCA is exportable (JCA and a SUN's default implementation included in Java2), but JCE is limited to some countries to limit exports. Therefore, to achieve a complete security structure, you need a JCE product from one or more third-party vendors, called security suppliers. Bouncycastle JCE is one of the security suppliers.

Safe suppliers are third parties that bear a particular security mechanism. Some suppliers are completely free, while others need to pay. Companies with security suppliers have IBM, Bounce Castle, and Sun provides details of how to achieve their own suppliers. Bounce Castle provides APIs that can be supported at the J2ME / J2EE / J2SE platform, and his API is free. See: http://www.bouncycastle.org/.

HONGBO781202, also known as hongsoft, professional programmer, research area: 1) Based on workflow 2) Java-based information security

Technology. Welcome to discuss all aspects of Java related aspects of technology and market issues hongbosoftware@163.com

转载请注明原文地址:https://www.9cbs.com/read-129624.html

New Post(0)