JAVA Toolkit
| home | contact

Home > Support > Books

News Menu

Latest News

Christmas Release


One day before Christmas we have released new versions of our SSL/TLS library iSaSiLk and our XML Security Toolkit IAIK-XSECT!

IAIK-JCE 5.60 and IAIK [CP]AdES 2.4 released!


IAIK-JCE 5.60 introduces a "subsidiary" provider as workaround for fixing a JDK JSSE MessageDigest Cloneable bug. IAIK [CP]AdES 2.4 fixes a bug in the AtsHashIndexv3 ASN.1 representation.


Our Clients



We have written a book on Java™ and cryptography, which has been published by Addison-Wesley. Unfortunately for the english-speaking folks, this book is not (yet) available in English - but we are working on that. But we have provided some book-recommendations for our English-speaking friends too!



Sicherheit und Kryptografie in Java
Einführung, Anwendung und Lösungen

Peter Lipp, Dieter Bratko, Wolfgang Platzer, Johannes Farmer, Andreas Sterbenz

552 Seiten, Auflage 1, ersch. 07-2000,
DM 89,90, ATS 656,00, CHF 78,00
ISBN 3827315670


Das Buch vermittelt dem Leser umfassende Kenntnisse auf dem Gebiet der Kryptografie und deren praktischen Umsetzung in Java™, der Java™ Cryptography Architecture (JCA) und der Java™ Cryptography Extension (JCE). Die Autoren geben wertvolle Tips, wie Kryptografie wirkungsvoll - und v.a. sicher - eingesetzt werden kann und veranschaulichen diese durch reale Beispiele. - Die Autoren sind die Entwickler des Softwarepakets IAIK-JCE, das die volle Funktionalität der JCE außerhalb der USA zur Vefügung stellt. Die beiliegende CD-ROM enthält die Beispiele des Buches sowie Kryptosoftware.



Angewandte Kryptographie
Protokolle, Algorithmen und Sourcecode in C.

Bruce Schneier


Ein Fachbuch für Programmierer, die professionelle Sicherheitskontrollen in Netze einbauen müssen und Daten verschlüsselt übermitteln wollen, um sich und ihre Auftraggeber zu schützen.
Nach einer kurzen Einführung in die Theorie der Verschlüsselung werden Protokolle und Algorithmen zur Verschlüsselung von Daten vorgestellt sowie ihre Funktionsweisen und Sicherheitsstufen analysiert. Das Buch enthält Quellcode in C und zeigt, wie dieser in größere Anwendungen eingebaut werden kann.



Internet - Kryptographie

Richard E. Smith


Richard Smith liefert mit seinem Buch einen aktuellen Überblick über den Einsatz kryptographischer Methoden im Internet. Es wendet sich hauptsächlich an Systemverwalter und Manager, die sichere Datenübertragungsmethoden planen und konfigurieren müssen. Daher wird der Leser nicht mit Implementierungsdetails belastet, sondern er erhält eine praxisorientierte Anleitung zum Einsatz moderner kryptographischer Methoden für Datenübertragung, sichere E-Mail und Web-Transaktionen. Es werden unter anderem Verschlüsselung auf Netzebene, IPSEC, VPNs, Firewalls, SSL und PEM behandelt. Das Buch gibt außerdem einen Überblick über Public-Key-Infrastrukturen und digitale Zertifikate.



Applied Cryptography:
Protocols, Algorithms, and Source Code in C, 2nd Edition
Bruce Schneier


Bruce Schneier's Applied Cryptography: Protocols, Algorithms, and Source Code in C offers an authoritative introduction to the field of cryptography, suitable for both the specialist and the general reader. The book adopts an encyclopedic approach to cryptographic systems throughout history, from ciphers to public key cryptography. Schneier also outlines cryptographic protocols--the steps required for secure encryption--with the precision of a chess master.
Readable, instructive, and truly exhaustive, this text is a must for anyone wanting a solid introduction to the field in a single volume. Applied Cryptography presents the source code for most algorithms and other procedures in C rather than using pure math. The book also includes source code for the Data Encryption Standard (DES) and other algorithms, but readers don't need to know programming to benefit from this text. With a truly comprehensive bibliography of over 1,600 entries, Applied Cryptography provides the reader with plenty of sources for more information.



Cryptography and Network Security
Principles and Practice
by William Stallings


New edition of a practical survey intended for both classroom use and self study. Coverage includes conventional encryption classical and modern techniques, and algorithms; public-key encryption and hash functions; network security, with regard to e-mail, IP, and the Web; and system security intruders, viruses, worms, and firewalls. The appendix contains research and programming projects, and reading/report assignments for teaching the subject. Book News, Inc.®, Portland,



Handbook of Applied Cryptography
(CRC Press Series on Discrete Mathematics and It Applications)
Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone


A hefty handbook for both novices and experts, introducing practical aspects of conventional and public-key cryptography and offering information on the latest techniques and algorithms in the field. Mathematical treatments accompany practical discussions of areas including pseudorandom bits and sequences, stream and block ciphers, hash functions, and digital signatures. Also covers establishment protocols, implementation, and patents and standards. Includes annotated chapter references, and cross-referencing between chapters, plus a bibliography of papers from selected cryptographic forums. -- Copyright © 1999 Book News, Inc., Portland, OR All rights reserved



Cryptography and Security in Java
(Advances in Object Technology Series , No 20)
by Joel Fan


Cryptography and Security in Java will help both managers and developers to understand Java as a platform for creating security-enabled applications. Joel Fan, a noted programmer and developer in Java and C++, provides managers with the truth about the strengths and limitations of Java security, and he shows programmers how to use effectively Java's Security API. By reading this book, managers will be able to grasp the issues involved in creating secure applications, and developers will have a critical headstart in creating such applications.



Java Security
by Scott Oaks


Scott Oakes' Java Security is extraordinary both for its technical depth and its readability. It provides the Java programmer with a complete overview of the Java security architecture and security classes, plus a wealth of detailed information and code examples for specific implementations. The book opens with a clear discussion of what Java security is, how the various Java sandbox models work, and how Java applications and applets execute within the security model. The following chapters look in depth at the elements of the Java security architecture: language rules, class loaders, the security manager, the access controller, and permission objects. All these chapters provide detailed information on implementation, as well as an excellent explanation of the role of each feature within the entire security picture.
The second half of the book covers cryptographic features in the Java security package (much enhanced in Java 1.2) and how Java programs work with code that performs authentication and encryption. Here, you'll find detailed chapters on message digests, keys and certificates, key management, digital signatures, and the Java Cryptography Extensions. Anyone who needs to understand Java security, but especially those who will implement security features in Java applications, will want to own this book.



Java Cryptography
by Jonathan Knudsen


Cryptography isn't all there is to security. But rendering information unintelligible to those without the proper key usually plays a big role in any networked data-sharing system. Java Cryptography shows the Java programmer (with or without crypto experience) how to implement ciphers, keys, and other data-obscuring techniques in Java.
The Java language includes lots of classes that are designed to facilitate cryptography, and this book explores them in depth. Key management classes, random-number generators, signed applets, and other parts of the Java security mechanism get attention in these pages. But most interesting are the author's examples. He has written a complete implementation of the ElGamal cipher as a provider in the framework of the Java Security API. If you want to understand how the Provider Architecture works, this is what you need to examine. Don't look here for an explanation of the mathematics, however.
In addition to his discussions and examples for individual pieces of the cryptography infrastructure and his implementation of the ElGamal system, Knudsen includes two nifty crypto-enabled programs: a chat system and an e-mail system.



Understanding the Public-Key Infrastructure
(Macmillan Technology Series)
by Carlisle Adams, Steve Lloyd


This book is a tutorial on, and a guide to the deployment of, Public-Key Infrastructures. It covers a broad range of material related to PKIs, including certification, operational considerations and standardization efforts, as well as deployment issues and considerations. Emphasis is placed on explaining the interrelated fields within the topic area, to assist those who will be responsible for making deployment decisions and architecting a PKI within an organization.


print    tip a friend
back to previous page back  |  top to the top of the page