Journal of Applied Sciences1812-56541812-5662Asian Network for Scientific Information10.3923/jas.2006.482.510RabahKefa 3200663Today and without a doubt, we live in a net-centric world in which new information technologies arrive at lightning speed, allowing us to share information locally to globally faster than ever before. The bad guys are equally out there to eavesdrop on our data transactions over the insecure communication channels. Cryptography can be used to help us secure our data communication. In this study we describe a Java implementation of secure RSA cryptosystems using your cryptographic provider, Java Cryptographic Extension (JCE). We then illustrate the use of this implementation in a working prototype. We then explain the naïve procedure for implementation of RSA cryptosystems and signature algorithm followed by the real time Java implementation using Open Source Bouncy Castle JCE provider.]]>Rabah, K.,20043106132Rabah, K.,20054307325Rivest, R., A. Shamir and L.M. Adleman,19831983Diffie, W. and M.E. Hellman,196622644654Rabin, M.O.,1979National Institute of Standards and Technology,19931993Rabah, K.,20052005Elgamal, T.,198531469472Koblitz, N.,198748203209Miller, V.S.,19861986pp: 417-426pp: 417-426Rabah, K.,20055604633Merkle, R.C.,197821294299Zimmermann, P.,1992Agrawal, M., N. Kayal and N. Saxena,2005181129141Boneh, D. and G. Durfee, 20004613391349Durfee, G. and P. Nguyen,19901990Wiener, M.,199036553558Hastad, J.,198817336341Boneh, D.,199946203213Knuth, D.E.,1969Lenstra, Jr. H.W.,1987126649673Pollard, J.M.,19931554410Leutwyler, K.,19942711720Cowie, J., B. Dodson, R.M. Elkenbracht-Huizing, A.K. Lenstra, P.L. Montgomery and J. Zayer,19961996pp: 382-394pp: 382-394Shor, P.W.,19941994pp: 124134Shor, P.W.,19972614841509Lenstra, A.K. and A. Shamir,200018073552Bernstein, D.,20012001Shamir, A. and E. Tromer,2003pp: 1-26pp: 1-26Boneh, D. and H. Shacham,2002Damgard, T.B.,19891989pp: 416427Rivest, R.L., A. Shamir and L. Adleman,197821120126Frier, A., P. Karlton and P. Kocher,20052005Rabah, K.,20043245269