Тёмный

Cryptography 101 for Java developers by Michel Schudel 

Devoxx
Подписаться 157 тыс.
Просмотров 28 тыс.
50% 1

So you're logging in to your favorite crypto currency exchange over https using a username and password, executing some transactions, and you're not at all surprised that, security wise, everything's hunky dory...
The amount of cryptography to make all this happen is staggering. In order to appreciate and understand what goes on under the hood, as a developer, it's really important to dive into the key concepts of cryptography .
In this session, we discover what cryptography actually is, and will use the JCA (Java Cryptography API) en JCE (Java Cryptography Extensions) in the JDK to explain and demo key concepts such as:
Message digests (hashing)
Encryption, both symmetric and asymmetric
Digital signatures, both symmetric and asymmetric
Furthermore, we'll show how these concepts find their way into a variety of practical applications such as:
https and certificates
salted password checking
block chain technology
After this session, you'll have a better understanding of basic cryptography, its applications, and how to use the cryptography APIs in Java.

Наука

Опубликовано:

 

15 май 2019

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 36   
@dineshagrawalla7062
@dineshagrawalla7062 2 года назад
Cryptography at first place sounds so complex but Michel has made it so simple. Any novice would get a good sense of it just in 40 minutes. Thanks Michel.
@RafaelNascimento-qo1jp
@RafaelNascimento-qo1jp 4 года назад
Excelent! The most concise overview of securities API in Java thanks!
@rajeshrenke6471
@rajeshrenke6471 3 года назад
That was simply great.. In short time covered a lot with examples.. thumbs up!!!
@rafaelleduarte
@rafaelleduarte 11 месяцев назад
Hi🇧🇷. This class is also an asmr. What a beautiful accent❣️
@Optimusjf
@Optimusjf Год назад
Thank you very much. The class was excellent.
@tanuj128
@tanuj128 4 года назад
Ya really, the talk was amazing... though i have worked on them but the way it was present with detail background knowledge was really nice... I will store this video for my future references. Can I request you to share the presentation also
@MrMikomi
@MrMikomi Год назад
Great presentation, thanks!
@emersontavera9362
@emersontavera9362 8 месяцев назад
great talk, just amazing, thank u so much
@BharCode09
@BharCode09 4 года назад
Collision chances are almost square the age of universe= he says "Its takes quite a while, so don't worry" :D. Funny guy I must say! Enjoyed the talk as well the knowledge shared..
@nO_d3N1AL
@nO_d3N1AL 9 месяцев назад
I'd recommend the Computerphile video on the mathematics of Diffie-Hellman for anyone that's interested, it's actually quite elegant :)
@iamvardhanharsha1992reddy
@iamvardhanharsha1992reddy 4 года назад
Great talk
@slr150
@slr150 3 года назад
23:28 Diffie-Hellman Exchange (DHE) used out of the box is susceptible to man-in-the-middle attacks. Note that TLS can be configured to use DHE ciphers but, in these situations TLS will sign the DHE shared keys with RSA.
@thisaditya7
@thisaditya7 9 месяцев назад
Awesome exokanation man!!
@fareselamine8115
@fareselamine8115 2 года назад
Very informative and simple video to follow, thank you! One quick question though which might sound a bit noob-ish: What's the point behind adding a "name: " before the string inside the parameter of Utils's functions? Whenever I try that out, it gives me errors. EDIT: Apparently it's an IntelliJ feature, never used it before so makes sense why I was thrown off by it.
@horsthorstmann7921
@horsthorstmann7921 Год назад
Very nice Video, but one hint: The public key ist not shorter than the private key because it is an asymmetric method. It is shorter because the private key consists all informations/numbers and the public key only a part of it. With OpenSSL you normally generate a (private) key. And with a second call you exctract the public key from this private key.
@user-nf1dg2rn4v
@user-nf1dg2rn4v 9 месяцев назад
That was simply great. But I have 1 question: When you explained about asymmetric cryptography, you said we encrypt with the private key and decrypt with the public key I think it's only in digital signature, When we deal with the asymmetric key we should encrypt with the public key, and the receiver decrypts with the private key, no? Thanks
@grillbaer
@grillbaer 5 лет назад
Thank you for this great talk! It provides a nice quick overview of the Java classes to start with when using cryptography. Shouldn't the RSA PUBLIC key be used in the example to ENCRYPT a message to provide confidentiality? The slide and code use the PRIVATE key for encryption and the PUBLIC key for decryption here?
@michelschudel2300
@michelschudel2300 3 года назад
It depends on what your want to do. For digital signatures, the sender encrypts using private key and the receiver decrypts using public key, because you want to be sure the sender is actually who he or she says eh/she is. When doing asymmetric encryption, you want to make sure that only the receipient can read your message. So, in that case, you encrupt using the receipient's public key, and he decrypts it using his private key.
@michelschudel2300
@michelschudel2300 3 года назад
asymmetric encryption is not really suited for large data because 1. Encrypted data is about 1,5 the size of the original data 2. Key of n bytes can only encrypt about n / 5 data in one turn 3. Symmetric encryption is a large magnitude of times (about 5000) faster than asymmetric encryption.
@damonreginald8495
@damonreginald8495 2 года назад
I know Im asking the wrong place but does any of you know of a method to get back into an instagram account..? I somehow lost my password. I appreciate any assistance you can give me.
@kendalljoshua3182
@kendalljoshua3182 2 года назад
@Damon Reginald instablaster :)
@damonreginald8495
@damonreginald8495 2 года назад
@Kendall Joshua I really appreciate your reply. I found the site on google and Im trying it out atm. I see it takes quite some time so I will get back to you later when my account password hopefully is recovered.
@marianpazdzioch5437
@marianpazdzioch5437 Год назад
Enigma was cracked by Polish mathematics, not by Turing FFS!
@shishirkumar4932
@shishirkumar4932 4 года назад
19.9 The decryption might have been happening in some other machine. How will it get the same 'key' object?
@michelschudel2300
@michelschudel2300 3 года назад
Good question! Symmetric key exchange can be done by using asymmetric encryption or DH-exchange. I hope I explained that a bit further in the session.
@homeofcreation
@homeofcreation 9 месяцев назад
the world wants to know.
@pickkideb
@pickkideb 3 года назад
30:09 Sender encrypts using public key and receiver decrypts using private key. The slide is showing opposite. Can anybody verify this fact?
@michelschudel2300
@michelschudel2300 3 года назад
The slide says: sender encrypts using private key. Might have misspoken though, not checked yet... but the slide is the correct one.
@philsmart11
@philsmart11 3 года назад
The slide looks the wrong way round to me. Encrypt with a private key would lead to a digital signature.
@alisonlapoint2094
@alisonlapoint2094 2 года назад
Exept Alice is blocked from hash
@alisonlapoint2094
@alisonlapoint2094 2 года назад
What if a bill of legislation has amended a hash and a block key. That is coded me as $ine & die dead and can't get id amd Evan if I did the hash will not let me inter it in and confirm in the s
Далее
Quickly Analysing A Heap Memory Leak by Jack Shirazi
28:34
Получилось у Миланы?😂
00:13
Просмотров 1,2 млн
Explaining Keystores | Part 1 - JKS
8:23
Просмотров 54 тыс.
Authentication as a Microservice
50:26
Просмотров 215 тыс.
ОБСЛУЖИЛИ САМЫЙ ГРЯЗНЫЙ ПК
1:00
Крупный ПРОВАЛ Samsung
0:48
Просмотров 621 тыс.
APPLE дают это нам БЕСПЛАТНО!
1:01
Просмотров 772 тыс.