YoVDO

How to Use Java Cryptography API Securely

Offered By: Java via YouTube

Tags

Encryption Algorithms Courses Hash Functions Courses HMAC Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Discover how to securely implement the Java Cryptography API in this comprehensive 41-minute talk by Mansi Sheth, Security Researcher at Veracode Inc. Learn about cryptographic primitives including random number generators, encryption/decryption algorithms, and HMACs. Gain insights into making correct algorithmic and keying material choices, understand areas requiring careful attention, and explore code examples demonstrating proper and improper usage. Delve into topics such as cryptography disclaimers, Java Crypto Architecture challenges, Cryptographically Secure Pseudo-Random Number Generators (CSPRNG), cipher configuration parameters, hash functions, and crypto systems. Equip yourself with the knowledge to navigate the complexities of Java Cryptography API and implement secure cryptographic solutions in your projects.

Syllabus

Intro
Cryptography Disclaimers
Starting with some basics
Problems with Java Crypto Architecture
Number Generator (CSPRNG)
Parameters in Configuring a Cipher
Hash Functions
Decisions, Decisions ...
Crypto Systems


Taught by

Java

Related Courses

Web Authentication With Golang - Google's Go Language
Udemy
Jupyter Hub - Teaching Crypto - Hashing
Bill Buchanan OBE via YouTube
API Abuse through Mobile Apps - New Attacks, New Defenses
RSA Conference via YouTube
Preventing Mobile App and API Abuse
OWASP Foundation via YouTube
Authentication as a Microservice - Portable Customer Identity Management
OWASP Foundation via YouTube