Cryptography 101 for Java developers by Michel Schudel

Cryptography 101 for Java developers by Michel Schudel

Devoxx

5 лет назад

27,947 Просмотров

So you're logging in to your favorite crypto currency exchange over https using a username and password, executing some transactions, and you're not at all surprised that, security wise, everything's hunky dory...

The amount of cryptography to make all this happen is staggering. In order to appreciate and understand what goes on under the hood, as a developer, it's really important to dive into the key concepts of cryptography .

In this session, we discover what cryptography actually is, and will use the JCA (Java Cryptography API) en JCE (Java Cryptography Extensions) in the JDK to explain and demo key concepts such as:

Message digests (hashing)
Encryption, both symmetric and asymmetric
Digital signatures, both symmetric and asymmetric
Furthermore, we'll show how these concepts find their way into a variety of practical applications such as:

https and certificates
salted password checking
block chain technology
After this session, you'll have a better understanding of basic cryptography, its applications, and how to use the cryptography APIs in Java.

Тэги:

#DevoxxUK #DevoxxUK2019
Ссылки и html тэги не поддерживаются


Комментарии:

Emerson Tavera
Emerson Tavera - 08.11.2023 06:57

great talk, just amazing, thank u so much

Ответить
זאב אברמוביץ'
זאב אברמוביץ' - 25.10.2023 23:21

That was simply great. But I have 1 question:
When you explained about asymmetric cryptography, you said we encrypt with the private key and decrypt with the public key
I think it's only in digital signature, When we deal with the asymmetric key we should encrypt with the public key, and the receiver decrypts with the private key, no?
Thanks

Ответить
Sina Madani
Sina Madani - 25.10.2023 13:58

I'd recommend the Computerphile video on the mathematics of Diffie-Hellman for anyone that's interested, it's actually quite elegant :)

Ответить
Home of Creation
Home of Creation - 14.10.2023 16:06

the world wants to know.

Ответить
Aditya Mishra
Aditya Mishra - 09.10.2023 19:49

Awesome exokanation man!!

Ответить
Rafaelle Duarte
Rafaelle Duarte - 14.08.2023 22:17

Hi🇧🇷. This class is also an asmr. What a beautiful accent❣️

Ответить
José Francisco Sodré
José Francisco Sodré - 10.06.2023 21:42

Thank you very much. The class was excellent.

Ответить
MrMikomi
MrMikomi - 07.05.2023 23:39

Great presentation, thanks!

Ответить
marian pazdzioch
marian pazdzioch - 03.03.2023 22:40

Enigma was cracked by Polish mathematics, not by Turing FFS!

Ответить
Horst Horstmann
Horst Horstmann - 20.01.2023 17:33

Very nice Video, but one hint: The public key ist not shorter than the private key because it is an asymmetric method. It is shorter because the private key consists all informations/numbers and the public key only a part of it.

With OpenSSL you normally generate a (private) key. And with a second call you exctract the public key from this private key.

Ответить
Dinesh Agrawalla
Dinesh Agrawalla - 15.06.2022 07:19

Cryptography at first place sounds so complex but Michel has made it so simple. Any novice would get a good sense of it just in 40 minutes. Thanks Michel.

Ответить
alison lapoint
alison lapoint - 04.05.2022 10:05

What if a bill of legislation has amended a hash and a block key. That is coded me as $ine & die dead and can't get id amd Evan if I did the hash will not let me inter it in and confirm in the s

Ответить
alison lapoint
alison lapoint - 04.05.2022 09:58

Exept Alice is blocked from hash

Ответить
alison lapoint
alison lapoint - 04.05.2022 09:54

To bad thay dident listen to you..becouse every body's alkalizing me.basicly I'm paying a monthly phone bill and spending all my time paying magority of humans to make money depleting me of money hacking my hash and blocking me ,paying tibget fu$%% in the ass,just to be voted out of existence, nic

Ответить
Fares Elamine
Fares Elamine - 29.09.2021 00:30

Very informative and simple video to follow, thank you!
One quick question though which might sound a bit noob-ish: What's the point behind adding a "name: " before the string inside the parameter of Utils's functions? Whenever I try that out, it gives me errors.

EDIT: Apparently it's an IntelliJ feature, never used it before so makes sense why I was thrown off by it.

Ответить
Rajesh Renke
Rajesh Renke - 15.03.2021 01:12

That was simply great.. In short time covered a lot with examples.. thumbs up!!!

Ответить
Harsha
Harsha - 14.08.2020 08:54

Great talk

Ответить
Shishir Kumar
Shishir Kumar - 01.07.2020 00:21

19.9 The decryption might have been happening in some other machine. How will it get the same 'key' object?

Ответить