?
JCE foundation
Java security architecture analysis
The figure below shows the standard components of the Java security architecture. In the lower half of the figure, the core of the Java2 security architecture is the core and Java encryption architecture (JAVA, Java Cryptography Architecture), which constitutes a Java2 security platform belled in the Java2 platform. In the upper part of the figure, Java security extensions independent of Java2 platform and different aspects of the Java2 platform.
?
???????? From the figure, it can be seen that the Java platform provides two sets of APIs: JCA and JCE for security and encryption services. JCA? (Java? Cryptography? Architecture provides basic encryption framework, such as certificate, digital signature, message summary, and key pair generator; JCE performs an extension on the basis of JCA, including encryption algorithms, key exchange, Key generation and message authentication service and other interfaces.
JCA and JCE ??????? JCA / JCE does not perform various algorithms, only a set of interfaces for connecting applications and actual algorithms implement programs. Software developers are implemented in accordance with the JCE interface, packing into a provike, which can be dynamically added to the Java operating environment. Due to the US export control regulations, JCA is exportable (JCA and a SUN default implementation included in Java2), but JCE is restricted to some countries. Therefore, to achieve a complete security structure, you need a JCE product from one or more third-party vendors, called security suppliers. Bouncycastle JCE is one of the security suppliers.
???? Safety supplier is a third party that assumes a specific security mechanism. Some suppliers are completely free, while others need to pay. Companies with security suppliers have IBM, Bounce Castle, and Sun provides details of how to achieve their own suppliers. Bounce Castle provides APIs that can be supported at the J2ME / J2EE / J2SE platform, and his API is free. See: http://www.bouncycastle.org/.
?
?
HONGBO781202, also known as hongsoft, professional programmer, research area: 1) Based on workflow 2) Java-based information security
Technology. Welcome to discuss all aspects of Java related aspects of technology and market issues hongbosoftware@163.com
?