Mark Herschberg, author of The Career Toolkit
https://www.thecareertoolkitbook.com/
Mark Herschberg, author of The Career Toolkit
https://www.thecareertoolkitbook.com/
Associate Instructor - Hofstra University
Amazon Top 750 reviewer - Blog - Unresolved References - Book Review Blog
Associate Instructor - Hofstra University
Amazon Top 750 reviewer - Blog - Unresolved References - Book Review Blog
Associate Instructor - Hofstra University
Amazon Top 750 reviewer - Blog - Unresolved References - Book Review Blog
Originally posted by Chan py:
Just want to ask one more things, does the Encryption and Decryption methods in the BouncyCastle reach the standard of RSA,
how high the sevurity level it reach? if it is not so high, then is it possible to modify the source code, so that i can reach a more security level, like the SSL in the web browser?
Mark Herschberg, author of The Career Toolkit
https://www.thecareertoolkitbook.com/
Originally posted by Balaji Loganathan:
Hi guys...
I'm sure the latest version of J2ME wireless toolkits support https....why don't we choose that for any sort of secure communications....
Rgds
Balaji
Mark Herschberg, author of The Career Toolkit
https://www.thecareertoolkitbook.com/
Originally posted by Chan py:
What is the Https supports? How it can improve the security level of SSL ? How to use this channel to achieve the aim of secure tading transaction ?
chanoch<p><a href="http://www.amazon.com/exec/obidos/ASIN/1861007736/" target="_blank" rel="nofollow">Author of Professional Apache Tomcat</a></p>
Originally posted by Chan py:
I have tried to implement the RSA algorithm on a palm recently, but I found that it cost too much time for generate the key, (almost loop infinity). Is it the real case? Or I use a wrong method to implement?
Mark Herschberg, author of The Career Toolkit
https://www.thecareertoolkitbook.com/
chanoch<p><a href="http://www.amazon.com/exec/obidos/ASIN/1861007736/" target="_blank" rel="nofollow">Author of Professional Apache Tomcat</a></p>
Originally posted by chanoch wiggers:
how do you do JNI in MIDP?
Mark Herschberg, author of The Career Toolkit
https://www.thecareertoolkitbook.com/
Originally posted by Chan py:
Sorry for asking a silly question :
if I want to use DES for data encryption, and the encrypt data is in a length of 80 characters, how long does the key I need to use? And can I defined my own key in anyway, or i need to follow some restriction in order to defined the key ?
If i use trple DES, I know it will use 3 keys in succession, then can i defind all the 3 keys, or it need to let for the engine to do?
Mark Herschberg, author of The Career Toolkit
https://www.thecareertoolkitbook.com/
Originally posted by Chan py:
Sorry for asking a silly question :
if I want to use DES for data encryption, and the encrypt data is in a length of 80 characters, how long does the key I need to use? And can I defined my own key in anyway, or i need to follow some restriction in order to defined the key ?
If i use trple DES, I know it will use 3 keys in succession, then can i defind all the 3 keys, or it need to let for the engine to do?
Can you shoot lasers out of your eyes? Don't look at this tiny ad:
a bit of art, as a gift, that will fit in a stocking
https://gardener-gift.com
|