From the course: Learn Java Cryptography

Unlock this course with a free trial

Join today to access over 25,500 courses taught by industry experts.

Next steps

Next steps

- [Instructor] So now that we've gone through the JCA and cryptography, you may be asking yourself what's next. And I'd like to talk a little bit through that. But before we jump in, let's do a quick recap on what we focused on in this course. We started with a general discussion of cryptography and crypto in java itself. We looked at the history of cryptography and we talked about some terminology so that we could level set on the language that we're all using when discussing crypto. We then went into discussions of encryption, both asymmetric and symmetric and did code examples of both of those. We then talked about cryptographic hashing and how to create a method to do a cryptographic hash. We dug in a little bit into the complexity of password hashing and talked about leveraging B crypt for passwords in your real world scenarios today. And finally we concluded with a discussion of both digital signatures and Java…

Contents