Close Menu
Şevket Ayaksız

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Google Maps vs Waze: I Put the Two Best Navigation Apps Head-to-Head — and One Clearly Came Out on Top

    Mayıs 1, 2026

    Samsung Electronics Offers Free 32-Inch Odyssey gaming monitor: Eligibility and How to Claim Deal

    Mayıs 1, 2026

    T-Mobile Bundles Free Hulu and Netflix for 5G Users: Eligibility Explained

    Mayıs 1, 2026
    Facebook X (Twitter) Instagram
    • software
    • Gadgets
    Facebook X (Twitter) Instagram
    Şevket AyaksızŞevket Ayaksız
    Subscribe
    • Home
    • Technology

      Google Maps vs Waze: I Put the Two Best Navigation Apps Head-to-Head — and One Clearly Came Out on Top

      Mayıs 1, 2026

      T-Mobile Bundles Free Hulu and Netflix for 5G Users: Eligibility Explained

      Mayıs 1, 2026

      This Portable Mini PC Is the Unexpected Raspberry Pi Alternative You Might Actually Want

      Mayıs 1, 2026

      Samsung warns RAM shortages could worsen beyond 2027

      Mayıs 1, 2026

      Oxford study finds friendly AI chatbots are less accurate

      Mayıs 1, 2026
    • Adobe
    • Microsoft
    • java
    • Oracle
    Şevket Ayaksız
    Anasayfa » OpenJDK Proposals Aim to Enhance Java Integrity and Encryption
    software

    OpenJDK Proposals Aim to Enhance Java Integrity and Encryption

    By mustafa efeTemmuz 14, 2024Yorum yapılmamış3 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Proposals Include API Restrictions for Code Integrity and New Key Encapsulation Mechanism API

    Code and data integrity and encryption support in Java would get boosts from two different proposals floating in the open source Java community. One proposal would tighten strong encapsulation of Java APIs, and the second would deliver an API for Key Encapsulation Mechanism, an encryption technique that promises to provide protection against quantum computers.

    A draft Java Enhancement Proposal (JEP) for integrity and strong encapsulation, posted in openjdk.org, is intended to restrict APIs to prevent them from breaking strong encapsulation, while still accommodating use cases that need to operate beyond encapsulation boundaries. Strong encapsulation is one of the Java platform features that assures code and data integrity by default, the JEP notes. However, this can be circumvented by some APIs, causing headaches for maintenance and performance.

    The proposal, which would be incorporated into the standard edition of Java, cites the following goals: Allowing Java to maintain invariants (conditions that always hold) of its own operation as well as that of Java applications that are required for maintainability, security, and performance.

     

     

    Clarifying the Java and non-Java APIs that can break strong encapsulation. Differentiating use cases where breaking encapsulation is convenient from use cases where disabling encapsulation is essential. It is not a goal of the proposal to guard against situations where users compromise the integrity of the Java platform by manipulating the underlying file system, operating system, or hardware, the proposal states. Appropriate integrity mechanisms in the operating system should always be used to protect the Java platform and Java applications.

    The other draft JEP would introduce a Key Encapsulation Mechanism (KEM) API. KEM is a modern cryptographic technique designed to encrypt symmetric keys using asymmetric or public key cryptography. It differs from the more traditional technique that encrypts a randomly generated symmetric key with a public key. According to the JEP, the KEM mechanism is simpler and also addresses several disadvantages of the traditional approach.

    Also positioned for standard Java, the KEM API proposal is intended to enable applications to make use of KEM and KEM algorithms such as RSA Key Encapsulation Mechanism (RSA-KEM), Elliptic Curve Integration Encryption Scheme (ECIES), and candidate KEM algorithms for the National Institute of Standards and Technology (NIST) Post-Quantum Cryptography (PQC) standardization process. The plan is to enable the use of KEM in higher-level protocols such as Transport Layer Security (TLS). Implementers would be permitted to develop security providers that implement KEM algorithms developed in Java or native code.

    Post Views: 316
    java Programming Languages Software Development
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    mustafa efe
    • Website

    Related Posts

    Anthropic’s Claude Security Tool Analyzes Codebases to Detect Vulnerabilities and Prioritize Fixes

    Mayıs 1, 2026

    Microsoft’s Windows Insider Program Finally Becomes More Streamlined and User-Friendly

    Nisan 11, 2026

    Microsoft launches tool to gather user feedback on Windows issues

    Nisan 8, 2026
    Add A Comment

    Comments are closed.

    Editors Picks
    8.5

    Apple Planning Big Mac Redesign and Half-Sized Old Mac

    Ocak 5, 2021

    Autonomous Driving Startup Attracts Chinese Investor

    Ocak 5, 2021

    Onboard Cameras Allow Disabled Quadcopters to Fly

    Ocak 5, 2021
    Top Reviews
    9.1

    Review: T-Mobile Winning 5G Race Around the World

    By sevketayaksiz
    8.9

    Samsung Galaxy S21 Ultra Review: the New King of Android Phones

    By sevketayaksiz
    8.9

    Xiaomi Mi 10: New Variant with Snapdragon 870 Review

    By sevketayaksiz
    Advertisement
    Demo
    Şevket Ayaksız
    Facebook X (Twitter) Instagram YouTube
    • Home
    • Adobe
    • microsoft
    • java
    • Oracle
    • Contact
    © 2026 Theme Designed by Şevket Ayaksız.

    Type above and press Enter to search. Press Esc to cancel.