Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Android Application Security Essentials

You're reading from   Android Application Security Essentials Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everything from Android security architecture to safeguarding mobile payments.

Arrow left icon
Product type Paperback
Published in Aug 2013
Publisher Packt
ISBN-13 9781849515603
Length 218 pages
Edition 1st Edition
Languages
Tools
Arrow right icon
Author (1):
Arrow left icon
Pragati Rai Pragati Rai
Author Profile Icon Pragati Rai
Pragati Rai
Arrow right icon
View More author details
Toc

Table of Contents (12) Chapters Close

Preface 1. The Android Security Model – the Big Picture FREE CHAPTER 2. Application Building Blocks 3. Permissions 4. Defining the Application's Policy File 5. Respect Your Users 6. Your Tools – Crypto APIs 7. Securing Application Data 8. Android in the Enterprise 9. Testing for Security 10. Looking into the Future Index

Symmetric key cryptography


The symmetric key cryptography is based on a secret key that is the same for both parties. The same key is used for both encryption and decryption. This is a problem compared to the public key cryptography, as it is required to exchange the secret keys securely by some means. If an eavesdropper gets hold of the key, the security of the system is defeated.

Symmetric key is much faster than a public key and is ideal when encrypting/decrypting large chunks of data. Security of a symmetric key algorithm is based on the length of the key.

Stream cipher

A stream cipher is a type of a symmetric key cryptography where each bit or byte of data is encrypted individually with a stream of random bits called a key stream. Usually, each bit or byte is XORed (Exclusive OR) with a key stream. The length of the key stream is the same as the length of data. The security of a stream cipher depends upon the randomness of the key stream. If the same key stream is used for encrypting multiple...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image