A java cryptography service provider implementing one-time pad

Timothy Lindquist, Mohamed Diarra, Bruce R. Millard

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

Abstract

Security is a challenging aspect of communications today that touches many areas including memory space, processing speed, code development and maintenance issues. When it comes to dealing with lightweight computing devices, each of these problems is amplified. In an attempt to address some of these problems, SUN's Java 2 Standard Edition version 1.4 includes the Java Cryptography Architecture (JCA). The JCA provides a single encryption API for application developers within a framework where multiple service providers may implement different algorithms. To the extent possible application developers have available multiple encryption technologies through a framework of common classes, interfaces and methods. The One Time Pad encryption method is a simple and reliable cryptographic algorithm whose characteristics make it attractive for communication with limited computing devices. The major difficulty of the One-Time pad is key distribution.In this paper, we present an implementation of One-Time Pad as a JCA service provider, and demonstrate its usefulness on Palm devices.

Original languageEnglish (US)
Title of host publicationProceedings of the Hawaii International Conference on System Sciences
EditorsR.H. Sprague Jr.
Pages2967-2972
Number of pages6
Volume37
StatePublished - 2004
EventProceedings of the Hawaii International Conference on System Sciences - Big Island, HI., United States
Duration: Jan 5 2004Jan 8 2004

Other

OtherProceedings of the Hawaii International Conference on System Sciences
Country/TerritoryUnited States
CityBig Island, HI.
Period1/5/041/8/04

ASJC Scopus subject areas

  • Software
  • Industrial and Manufacturing Engineering

Fingerprint

Dive into the research topics of 'A java cryptography service provider implementing one-time pad'. Together they form a unique fingerprint.

Cite this