Table of Contents
Symmetric encryption in Java
Example
Output
Explanation
Key points to remember
in conclusion
Home Java javaTutorial Symmetric encryption cryptography in Java

Symmetric encryption cryptography in Java

Sep 13, 2023 pm 03:49 PM
Symmetric encryption java programming Cryptography

Symmetric encryption cryptography in Java

Introduction

Symmetric encryption, also known as key encryption, is an encryption method in which the same key is used for encryption and decryption. This encryption method is fast and efficient and suitable for encrypting large amounts of data. The most commonly used symmetric encryption algorithm is Advanced Encryption Standard (AES).

Java provides strong support for symmetric encryption, including classes in the javax.crypto package, such as SecretKey, Cipher, and KeyGenerator.

Symmetric encryption in Java

The Java Cipher class in the javax.crypto package provides cryptographic functions for encryption and decryption. It forms the core of the Java Cryptozoology Extensions (JCE) framework.

In Java, the Cipher class provides the function of symmetric encryption, and the KeyGenerator class is used to generate symmetric encryption keys.

The Chinese translation of

Example

is:

Example

Let us look at an example of simple symmetric encryption AES implemented in Java−

import javax.crypto.Cipher;
import javax.crypto.KeyGenerator;
import javax.crypto.SecretKey;
import java.nio.charset.StandardCharsets;
import java.util.Base64;

public class Main {
   public static void main(String[] args) throws Exception {

      // Generate key
      SecretKey secretKey = KeyGenerator.getInstance("AES").generateKey();
   
      // Original message
      String originalMessage = "Hello, world!";
   
      // Create Cipher instance and initialize it to ENCRYPT_MODE
      Cipher cipher = Cipher.getInstance("AES");
      cipher.init(Cipher.ENCRYPT_MODE, secretKey);
   
      // Encrypt the message
      byte[] encryptedMessage = cipher.doFinal(originalMessage.getBytes(StandardCharsets.UTF_8));
   
      // Convert the encrypted message to Base64 encoded string
      String encodedMessage = Base64.getEncoder().encodeToString(encryptedMessage);
   
      System.out.println("Original Message: " + originalMessage);
      System.out.println("Encrypted Message: " + encodedMessage);
   
      // Reinitialize the cipher to DECRYPT_MODE
      cipher.init(Cipher.DECRYPT_MODE, secretKey);
   
      // Decrypt the message
      byte[] decryptedMessage = cipher.doFinal(Base64.getDecoder().decode(encodedMessage));
   
      System.out.println("Decrypted Message: " + new String(decryptedMessage, StandardCharsets.UTF_8));
   }
}
Copy after login

Output

When you run the program, you will see output similar to the following -

Original Message: Hello, world!
Encrypted Message: iWohhm/c89uBVaJ3j4YFkA==
Decrypted Message: Hello, world!
Copy after login
The Chinese translation of

Explanation

is:

Explanation

In the above code, we first use the KeyGenerator class to generate the secret key for AES encryption.

Then we create an instance of the Cipher class for AES and initialize it to ENCRYPT_MODE using the secret key.

Next, we define a raw message "Hello, world!" and encrypt it using Cipher's doFinal method. We also convert the encrypted message bytes into a Base64 encoded string to make it easier to process.

Then we print the original message and the encrypted message to the console.

To demonstrate decryption, we use the same key to reinitialize the password to DECRYPT_MODE and decrypt the encrypted message. Finally, we print the decrypted message to the console.

Since a unique secret key is generated every time you run the program, the encrypted message will be different each time.

The important thing to note here is that the decrypted message is the same as the original message, which indicates that our encryption and decryption process is working properly.

Key points to remember

Symmetric encryption is a powerful tool for maintaining confidentiality, but it's important to remember that your data is only as secure as your keys. If an unauthorized person obtains your secret key, they can decrypt your data. Therefore, it is crucial to keep the secret key safe.

in conclusion

Implementing symmetric encryption in Java is a simple process, thanks to the javax.crypto package. Understanding how to use the Cipher and KeyGenerator classes to encrypt and decrypt data can significantly improve the security of your Java applications.

The above is the detailed content of Symmetric encryption cryptography in Java. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

How to write a simple student performance report generator using Java? How to write a simple student performance report generator using Java? Nov 03, 2023 pm 02:57 PM

How to write a simple student performance report generator using Java? Student Performance Report Generator is a tool that helps teachers or educators quickly generate student performance reports. This article will introduce how to use Java to write a simple student performance report generator. First, we need to define the student object and student grade object. The student object contains basic information such as the student's name and student number, while the student score object contains information such as the student's subject scores and average grade. The following is the definition of a simple student object: public

How to write a simple student attendance management system using Java? How to write a simple student attendance management system using Java? Nov 02, 2023 pm 03:17 PM

How to write a simple student attendance management system using Java? With the continuous development of technology, school management systems are also constantly updated and upgraded. The student attendance management system is an important part of it. It can help the school track students' attendance and provide data analysis and reports. This article will introduce how to write a simple student attendance management system using Java. 1. Requirements Analysis Before starting to write, we need to determine the functions and requirements of the system. Basic functions include registration and management of student information, recording of student attendance data and

How to use Java programming to implement the address location search of the Amap API How to use Java programming to implement the address location search of the Amap API Jul 30, 2023 pm 07:41 PM

How to use Java programming to implement the address location search of the Amap API Introduction: Amap is a very popular map service and is widely used in various applications. Among them, the search function near the address location provides the ability to search for nearby POI (Point of Interest, points of interest). This article will explain in detail how to use Java programming to implement the address location search function of the Amap API, and use code examples to help readers understand and master related technologies. 1. Apply for Amap development

ChatGPT Java: How to build an intelligent music recommendation system ChatGPT Java: How to build an intelligent music recommendation system Oct 27, 2023 pm 01:55 PM

ChatGPTJava: How to build an intelligent music recommendation system, specific code examples are needed. Introduction: With the rapid development of the Internet, music has become an indispensable part of people's daily lives. As music platforms continue to emerge, users often face a common problem: how to find music that suits their tastes? In order to solve this problem, the intelligent music recommendation system came into being. This article will introduce how to use ChatGPTJava to build an intelligent music recommendation system and provide specific code examples. No.

How to use Java to implement the inventory statistics function of the warehouse management system How to use Java to implement the inventory statistics function of the warehouse management system Sep 24, 2023 pm 01:13 PM

How to use Java to implement the inventory statistics function of the warehouse management system. With the development of e-commerce and the increasing importance of warehousing management, the inventory statistics function has become an indispensable part of the warehouse management system. Warehouse management systems written in the Java language can implement inventory statistics functions through concise and efficient code, helping companies better manage warehouse storage and improve operational efficiency. 1. Background introduction Warehouse management system refers to a management method that uses computer technology to perform data management, information processing and decision-making analysis on an enterprise's warehouse. Inventory statistics are

How to implement breadth first search algorithm using java How to implement breadth first search algorithm using java Sep 19, 2023 pm 06:04 PM

How to use Java to implement breadth-first search algorithm Breadth-First Search algorithm (Breadth-FirstSearch, BFS) is a commonly used search algorithm in graph theory, which can find the shortest path between two nodes in the graph. BFS is widely used in many applications, such as finding the shortest path in a maze, web crawlers, etc. This article will introduce how to use Java language to implement the BFS algorithm, and attach specific code examples. First, we need to define a class for storing graph nodes. This class contains nodes

Symmetric encryption cryptography in Java Symmetric encryption cryptography in Java Sep 13, 2023 pm 03:49 PM

IntroductionSymmetric encryption, also known as key encryption, is an encryption method in which the same key is used for encryption and decryption. This encryption method is fast and efficient and suitable for encrypting large amounts of data. The most commonly used symmetric encryption algorithm is Advanced Encryption Standard (AES). Java provides strong support for symmetric encryption, including classes in the javax.crypto package, such as SecretKey, Cipher, and KeyGenerator. Symmetric encryption in Java The JavaCipher class in the javax.crypto package provides cryptographic functions for encryption and decryption. It forms the core of the Java Cryptozoology Extensions (JCE) framework. In Java, the Cipher class provides symmetric encryption functions, and K

Java program: Capitalize first letter of each word in a string Java program: Capitalize first letter of each word in a string Aug 20, 2023 pm 03:45 PM

Astringisaclassof'java.lang'packagethatstoresaseriesofcharacters.ThosecharactersareactuallyString-typeobjects.Wemustenclosethevalueofstringwithindoublequotes.Generally,wecanrepresentcharactersinlowercaseanduppercaseinJava.And,itisalsopossibletoconver

See all articles