Design and Implementation of Java Crypto Provider for Android Platform 


Vol. 37,  No. 9, pp. 851-858, Sep.  2012


PDF
  Abstract

Java crypto library such as SUN JCA/JCE or BC JCE is generally used to implement secure applications for smart devices using Android platform. Programming functions written by Java language are launched and executed inside Java Virtual Machine (JVM), thereby difficult to use system hardware specific functionalities and degrading performance as well. In case of crypto primitive, few secure applications can use crypto primitive executing in JVM because both amount of computing and complexity of such primitives are very high. From the aspect of performance, in particular, time sensitive real time applications such as streaming services or secure application frequently applying public key based crypto algorithm cannot use Java crypto library. To solve the problem, we design and implement crypto library which employ JNI and NDK methods to directly access functions that implemented by native language such as C or C++. The proposed Java Crypto provider supports faster execution. Also developer can use our provider in the same way by writing traditional Java crypto library.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

M. Son and N. Kang, "Design and Implementation of Java Crypto Provider for Android Platform," The Journal of Korean Institute of Communications and Information Sciences, vol. 37, no. 9, pp. 851-858, 2012. DOI: .

[ACM Style]

Mikyung Son and Namhi Kang. 2012. Design and Implementation of Java Crypto Provider for Android Platform. The Journal of Korean Institute of Communications and Information Sciences, 37, 9, (2012), 851-858. DOI: .

[KICS Style]

Mikyung Son and Namhi Kang, "Design and Implementation of Java Crypto Provider for Android Platform," The Journal of Korean Institute of Communications and Information Sciences, vol. 37, no. 9, pp. 851-858, 9. 2012.