blob: e20c73d01b81ce062e0cb70779d23dedb895fcd7 [file] [log] [blame]
J. Duke319a3b92007-12-01 00:00:00 +00001<!--
2 Copyright 1998-2006 Sun Microsystems, Inc. All Rights Reserved.
3 DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
4
5 This code is free software; you can redistribute it and/or modify it
6 under the terms of the GNU General Public License version 2 only, as
7 published by the Free Software Foundation. Sun designates this
8 particular file as subject to the "Classpath" exception as provided
9 by Sun in the LICENSE file that accompanied this code.
10
11 This code is distributed in the hope that it will be useful, but WITHOUT
12 ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
13 FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
14 version 2 for more details (a copy is included in the LICENSE file that
15 accompanied this code).
16
17 You should have received a copy of the GNU General Public License version
18 2 along with this work; if not, write to the Free Software Foundation,
19 Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
20
21 Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa Clara,
22 CA 95054 USA or visit www.sun.com if you need additional information or
23 have any questions.
24-->
25
26<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
27<html>
28<body bgcolor="white">
29
30Provides interfaces for generating RSA (Rivest, Shamir and
31Adleman AsymmetricCipher algorithm)
32keys as defined in the RSA Laboratory Technical Note
33PKCS#1, and DSA (Digital Signature
34Algorithm) keys as defined in NIST's FIPS-186.
35<P>
36Note that these interfaces are intended only for key
37implementations whose key material is accessible and
38available. These interfaces are not intended for key
39implementations whose key material resides in
40inaccessible, protected storage (such as in a
41hardware device).
42<P>
43For more developer information on how to use these
44interfaces, including information on how to design
45<code>Key</code> classes for hardware devices, please refer
46to these cryptographic provider developer guides:
47<ul>
48 <li><a href=
49 "{@docRoot}/../technotes/guides/security/crypto/HowToImplAProvider.html">
50 <b>How to Implement a Provider for the
51 Java<FONT SIZE=-2><SUP>TM</SUP></FONT> Cryptography Architecture
52 </b></a></li>
53</ul>
54
55<h2>Package Specification</h2>
56
57<ul>
58 <li>PKCS #1: RSA Encryption Standard, Version 1.5, November 1993 </li>
59 <li>Federal Information Processing Standards Publication (FIPS PUB) 186:
60 Digital Signature Standard (DSS) </li>
61</ul>
62
63<h2>Related Documentation</h2>
64
65For further documentation, please see:
66<ul>
67 <li>
68 <a href=
69 "{@docRoot}/../technotes/guides/security/crypto/CryptoSpec.html">
70 <b>Java<FONT SIZE=-2><SUP>TM</SUP></FONT>
71 Cryptography Architecture API Specification and Reference
72 </b></a></li>
73</ul>
74
75@since JDK1.1
76</body>
77</html>