![]() The architecture aims for implementation Independence and interoperability and algorithm independence and extensibility. The JCA is part of the Java Development Kit (JDK) and supplies functionality that allows you to perform cryptographic operations. What is the Java Cryptography Architecture? So before we go any further I should probably give a quick explanation about what Bouncy Castle and the JCA are. The reason being that both implementations have their advantages and disadvantages and we thought having both would allow customers to choose their preferred option. You may be asking why did you need to change the functionality if it was working or why did you keep Bouncy Castle instead of replacing it. This is so that if customers preferred to use the Bouncy Castle implementation/provider then they still could. BUT we also wanted to keep the Bouncy Castle code in there. We wanted to remove this dependency so that the decryption code would still function correctly. Previously we only allowed decryption if the Bouncy Castle jar had been included in the classpath. Over the past few weeks at IDRsolutions we have been creating methods that will decrypt an encrypted PDF using Java’s Cryptography Architecture (JCA). Which security implementation should I use: Bouncy Castle or JCA? ![]() Her hobbies include reading, completing puzzle books and cycling. Georgia Ingham Georgia is a Java Developer. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |