Dear Guest, Please Register to Download Free Seminar Reports and PPT of each topic. The Download link will be visible only after the registration.Please search the topic before posting.

Please click the Facebook Like Button if you are satisfied

 Subscribe To Get Latest Seminar Reports and PPT

Receive all seminar updates via Facebook. Just Click the Like Button Below


Java cryptography architecture

Huge Collection of Information Technology Seminar Topics, Reports and PPT.

Java cryptography architecture

Postby richa08 » Mon Feb 20, 2012 5:17 am

please send me a report on the mentioned seminar topic as soon as possible. i would be grateful to you for this.
Posts: 1
Joined: Mon Feb 20, 2012 5:13 am

Re: Java cryptography architecture

Postby Prasanth » Mon Feb 20, 2012 3:00 pm

Java cryptography architecture

The Java platform strongly emphasizes security, including language safety, cryptography, public key infrastructure, authentication, secure communication, and access control.

The Java cryptography architecture (JCA) is a major piece of the platform, and contains a "provider" architecture and a set of APIs for digital signatures, message digests (hashs), certificates and certificate validation, encryption (symmetric/asymmetric block/stream ciphers), key generation and management, and secure random number generation, to name a few. These APIs allow developers to easily integrate security into their application code. The architecture was designed around the following principles:

Implementation independence

Applications do not need to implement security algorithms. Rather, they can request security services from the Java platform. Security services are implemented in providers (see below), which are plugged into the Java platform via a standard interface. An application may rely on multiple independent providers for security functionality.

Implementation interoperability

Providers are interoperable across applications. Specifically, an application is not bound to a specific provider, and a provider is not bound to a specific application.

Algorithm extensibility

The Java platform includes a number of built-in providers that implement a basic set of security services that are widely used today. However, some applications may rely on emerging standards not yet implemented, or on proprietary services. The Java platform supports the installation of custom providers that implement such services.

Full seminar report at

Tags : java security, java cryptography architecture ppt, java cryptography architecture tutorial, java cryptography architecture pdf, java cryptography architecture jca, java cryptography extension, java reference, java cryptography tutorial
You do not have the required permissions to download the files attached to this post. You must LOGIN or REGISTER to download these files.
User avatar
Site Admin
Posts: 488
Joined: Sat May 28, 2011 6:29 pm

Return to Information Technology Seminar Topics