Java Cryptography Architecture
Encyclopedia
The Java Cryptography Architecture (JCA) is a framework for working with cryptography
using the Java programming language
. It forms part of the Java security
API, and was first introduced in JDK 1.1 in the package.
The JCA uses a "provider"-based architecture and contains a set of APIs for various purposes, such as encryption
, key generation and management
, secure random number generation
, certificate validation
, etc. These APIs provide easy way for developers to integrate security into application code.
Cryptography
Cryptography is the practice and study of techniques for secure communication in the presence of third parties...
using the Java programming language
Java (programming language)
Java is a programming language originally developed by James Gosling at Sun Microsystems and released in 1995 as a core component of Sun Microsystems' Java platform. The language derives much of its syntax from C and C++ but has a simpler object model and fewer low-level facilities...
. It forms part of the Java security
Computer security
Computer security is a branch of computer technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to...
API, and was first introduced in JDK 1.1 in the package.
The JCA uses a "provider"-based architecture and contains a set of APIs for various purposes, such as encryption
Encryption
In cryptography, encryption is the process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information...
, key generation and management
Key management
Key management is the provisions made in a cryptography system design that are related to generation, exchange, storage, safeguarding, use, vetting, and replacement of keys. It includes cryptographic protocol design, key servers, user procedures, and other relevant protocols.Key management concerns...
, secure random number generation
Cryptographically secure pseudorandom number generator
A cryptographically secure pseudo-random number generator is a pseudo-random number generator with properties that make it suitable for use in cryptography.Many aspects of cryptography require random numbers, for example:...
, certificate validation
Public key certificate
In cryptography, a public key certificate is an electronic document which uses a digital signature to bind a public key with an identity — information such as the name of a person or an organization, their address, and so forth...
, etc. These APIs provide easy way for developers to integrate security into application code.