Sunday, October 25, 2009

About














































Beginning Cryptography with Java


David Hook


WILEY


Published by

Wiley Publishing, Inc.

10475 Crosspoint Boulevard
Indianapolis, IN 46256

http://www.wiley.com





Published by Wiley Publishing, Inc., Indianapolis, Indiana


Published simultaneously in Canada


Manufactured in the United States of America


10 9 8 7 6 5 4 3 2 1


1MA/SV/QX/QV/IN


No part of this publication may be reproduced,
stored in a retrieval system or transmitted in any form or by any
means, electronic, mechanical, photocopying, recording, scanning or
otherwise, except as permitted under Sections 107 or 108 of the 1976
United States Copyright Act, without either the prior written
permission of the Publisher, or authorization through payment of the
appropriate per-copy fee to the Copyright Clearance Center, 222
Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600.
Requests to the Publisher for permission should be addressed to the
Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd.,
Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online
at http://www.wiley.com/go/permissions.



LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: THE
PUBLISHER AND THE AUTHOR MAKE NO REPRESENTATIONS OR WARRANTIES WITH
RESPECT TO THE ACCURACY OR COMPLETENESS OF THE CONTENTS OF THIS WORK
AND SPECIFICALLY DISCLAIM ALL WARRANTIES, INCLUDING WITHOUT LIMITATION
WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE. NO WARRANTY MAY BE
CREATED OR EXTENDED BY SALES OR PROMOTIONAL MATERIALS. THE ADVICE AND
STRATEGIES CONTAINED HEREIN MAY NOT BE SUITABLE FOR EVERY SITUATION.
THIS WORK IS SOLD WITH THE UNDERSTANDING THAT THE PUBLISHER IS NOT
ENGAGED IN RENDERING LEGAL, ACCOUNTING, OR OTHER PROFESSIONAL SERVICES.
IF PROFESSIONAL ASSISTANCE IS REQUIRED, THE SERVICES OF A COMPETENT
PROFESSIONAL PERSON SHOULD BE SOUGHT. NEITHER THE PUBLISHER NOR THE
AUTHOR SHALL BE LIABLE FOR DAMAGES ARISING HEREFROM. THE FACT THAT AN
ORGANIZATION OR WEBSITE IS REFERRED TO IN THIS WORK AS A CITATION
AND/OR A POTENTIAL SOURCE OF FURTHER INFORMATION DOES NOT MEAN THAT THE
AUTHOR OR THE PUBLISHER ENDORSES THE INFORMATION THE ORGANIZATION OR
WEBSITE MAY PROVIDE OR RECOMMENDATIONS IT MAY MAKE. FURTHER, READERS
SHOULD BE AWARE THAT INTERNET WEBSITES LISTED IN THIS WORK MAYHAVE
CHANGED OR DISAPPEARED BETWEEN WHEN THIS WORK WAS WRITTEN AND WHEN IT
IS READ.


For general information on our other products and
services or to obtain technical support, please contact our Customer
Care Department within the U.S. at (800) 762-2974, outside the U.S. at
(317) 572-3993 or fax (317) 572-4002.


Wiley also publishes its books in a variety of
electronic formats. Some content that appears in print may not be
available in electronic books.



Library of Congress Cataloging-in-Publication Data


Hook, David, 1962-


Beginning cryptography with Java / David Hook.
p. cm.
Includes bibliographical references and index.



0-7645-9633-0



ISBN 13: 978-0-7645-9633-9


(paper/website)


ISBN-10: 0-7645-9633-0 (paper/website)


1. Computer security. 2. Cryptography. 3. Public
key infrastructure (Computer security) 4. Java (Computer program
language) I. Title.
QA76.9.A25H645 2005
005.8–dc22


2005011272



Trademarks: Wiley, the Wiley Publishing logo, Wrox,
the Wrox logo, Programmer to Programmer, and related trade dress are
trademarks or registered trademarks of John Wiley & Sons, Inc.
and/or its affiliates, in the United Statesand other countries, and may
not be used without written permission. Java is a trademark of Sun
Microsystems. All other trademarks are the property of their respective
owners. Wiley Publishing, Inc., is not associated with any product or
vendor mentioned in this book.



About the Author



David Hook


David Hook has been writing software in a variety
of domains and languages for the last 20 years. He has worked with Java
since 1995, originally doing medical imaging before moving into
cryptography and security a year or so later. In April 2000, he
co-founded the open source Bouncy Castle cryptography project and has
played an active role in it ever since. He currently works as a
freelance consultant, mainly in Java, doing the odd bit of lecturing
and writing on the side. When he is not using his spare time to work on
Bouncy Castle, he spends it pursuing his other interest in computer
graphics. He lives in Melbourne, Australia, with his most patient wife
Janine and a cat named Hamlet, who really seems to think he's a little
cryptographer in a fur coat. David can be reached at dgh@bund.com.au.



Credits



Acquisitions Editor: Carol Long

Development Editor: Kezia Endsley

Production Editor: Angela Smith

Copy Editor: Joanne Slike

Editorial Manager: Mary Beth Wakefield

Vice President & Executive Group Publisher: Richard Swadley

Vice President and Publisher: Joseph B. Wikert

Project Coordinator: Erin Smith

Graphics and Production Specialists: April Farling
Denny Hager
Jennifer Heleine
Julie Trippetti

Quality Control Technician: Carl Pierce
Brian H. Walls

Proofreading and Indexing: TECHBOOKS Production Services



To FB and HC.




Acknowledgments


First of all, I'd like to thank Peter Grant for
reviewing the chapters and exercises during the development of this
book, Jon Eaves who also provided additional feedback, and Bernard
Leach, who, with Peter and Jon, helped bring the Bouncy Castle project
to life.


I would also like to thank Simon McMahon for
additional feedback and comments, Jan Leuhe and Sharon Liu for
answering my questions on early JCE history for this book, not to
mention many of the other questions I've had over the years. Thanks
must also go to all the people making up the Bouncy Castle user
community—where the project has been successful; it is as much due to
your feedback, comments, contributions, and patience, as to any other
efforts.


To the Wrox crew, especially Carol Long and Carol
Griffith for helping me get started and keeping me on track, and to my
development editor Kezia Endsley, who never commented on the fact, that
as a first time author, I clearly had no idea what I was doing. If this
book provides you with all you expected, it is as much due to Kezia's
patient editing and direction as it is with any knowledge I have of the
subject.


Finally, I would like to thank the members of my
family. To my parents, Geoff and Pauline, brothers, Brendan, Martin,
and Warwick, and my sister, Sarah, you have all been a constant source
of inspiration and support. To my parents-in-law, Ron and Maureen, who
quietly went about helping my wife Janine repaint our house while I was
hiding in the office typing furiously, and to my wife Janine who found
time to support me through the book as well, what can I possibly say?
Thank you.







































No comments:

Post a Comment