Book Image

The Java Workshop

By : David Cuartielles, Andreas Göransson, Eric Foster-Johnson
Book Image

The Java Workshop

By: David Cuartielles, Andreas Göransson, Eric Foster-Johnson

Overview of this book

Java is a versatile, popular programming language used across a wide range of industries. Learning how to write effective Java code can take your career to the next level, and The Java Workshop will help you do just that. This book is designed to take the pain out of Java coding and teach you everything you need to know to be productive in building real-world software. The Workshop starts by showing you how to use classes, methods, and the built-in Collections API to manipulate data structures effortlessly. You’ll dive right into learning about object-oriented programming by creating classes and interfaces and making use of inheritance and polymorphism. After learning how to handle exceptions, you’ll study the modules, packages, and libraries that help you organize your code. As you progress, you’ll discover how to connect to external databases and web servers, work with regular expressions, and write unit tests to validate your code. You’ll also be introduced to functional programming and see how to implement it using lambda functions. By the end of this Workshop, you’ll be well-versed with key Java concepts and have the knowledge and confidence to tackle your own ambitious projects with Java.
Table of Contents (20 chapters)

Block Ciphers

AES is a block cipher, meaning that encryption is handled on one block of plaintext at a time. A block size depends on the key size; that is, a larger key means a larger block.

Initialization Vectors

Some of the transformation modes for block ciphers require you to work with an initialization vector – it's an improvement that handles the obvious repeat pattern of the ECB mode. This is easily visualized by an image showing the difference in encryption using AES/ECB and AES/CBC.

CBC refers to Cipher Block Chaining and, in short, it scrambles the current block of data based on the previous block of data. Or, if it was the first block, it scrambles the data based on the initialization vector.

Stream Ciphers

A stream cipher, on the other hand, works by encrypting each byte at a time. There is a theoretical discussion about what is known as "the one-time pad," which represents the ideal stream encryption. These are, in theory, extremely...