Research and Development on cryptography (Hashing, Encryption, etc.)
The list of sub-modules and the research they cover.
Print all the algorithm names supported by the JVM. This is what is passed to Cipher.getInstance("algorithm")
.
Print the names of all the security providers that are part of the JVM.
How to do a SHA-512 hash with a salt.
How to do single key, symmetric, encryption using AES/GCM/PKCS5Padding, with a 256 bit key, and a 96 bit IV.
The Java Cryptography Extension (JCE) Unlimited Strength is required to be installed for this.
How to do public/private key, asymmetric, encryption using RSA/ECB/OAEPWithSHA-512AndMGF1Padding, with a 4096 bit key.
Enjoy!