Subscribe Now Subscribe Today
Science Alert
Curve Top
Journal of Applied Sciences
  Year: 2006 | Volume: 6 | Issue: 3 | Page No.: 482-510
DOI: 10.3923/jas.2006.482.510
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Implementing Secure RSA Cryptosystems Using Your Own Cryptographic JCE Provider

Kefa Rabah

Today and without a doubt, we live in a net-centric world in which new information technologies arrive at lightning speed, allowing us to share information locally to globally faster than ever before. The bad guys are equally out there to eavesdrop on our data transactions over the insecure communication channels. Cryptography can be used to help us secure our data communication. In this study we describe a Java implementation of secure RSA cryptosystems using your cryptographic provider, Java Cryptographic Extension (JCE). We then illustrate the use of this implementation in a working prototype. We then explain the naïve procedure for implementation of RSA cryptosystems and signature algorithm followed by the real time Java implementation using Open Source Bouncy Castle JCE provider.
PDF Fulltext XML References Citation Report Citation
  •    Compiler Optimization and Plain Text Pre-Processing to Hoist the Height of HIGHT in AVR Platform
  •    A New CMM-NAF Modular Exponentiation Algorithm by using a New Modular Multiplication Algorithm
  •    Firmware for Data Security: A Review
  •    Two-layer Cellular Automata Based Cryptography
How to cite this article:

Kefa Rabah , 2006. Implementing Secure RSA Cryptosystems Using Your Own Cryptographic JCE Provider. Journal of Applied Sciences, 6: 482-510.

DOI: 10.3923/jas.2006.482.510






Curve Bottom