Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Java 9: Building Robust Modular Applications

You're reading from   Java 9: Building Robust Modular Applications Master advanced Java features and implement them to build amazing projects

Arrow left icon
Product type Course
Published in Apr 2018
Publisher Packt
ISBN-13 9781788832823
Length 910 pages
Edition 1st Edition
Languages
Tools
Arrow right icon
Authors (3):
Arrow left icon
Dr. Edward Lavieri Jr. Dr. Edward Lavieri Jr.
Author Profile Icon Dr. Edward Lavieri Jr.
Dr. Edward Lavieri Jr.
Jason Lee Jason Lee
Author Profile Icon Jason Lee
Jason Lee
Peter Verhas Peter Verhas
Author Profile Icon Peter Verhas
Peter Verhas
Arrow right icon
View More author details
Toc

Table of Contents (33) Chapters Close

Title Page - Courses
Packt Upsell - Courses
Preface
1. The Java 9 Landscape FREE CHAPTER 2. Discovering Java 9 3. Java 9 Language Enhancements 4. Building Modular Applications with Java 9 5. Migrating Applications to Java 9 6. Experimenting with the Java Shell 7. Leveraging the New Default G1 Garbage Collector 8. Microbenchmarking Applications with JMH 9. Making Use of the ProcessHandle API 10. Fine-Grained Stack Tracing 11. New Tools and Tool Enhancements 12. Concurrency and Reactive Programming 13. Security Enhancements 14. Command Line Flags 15. Best Practices In Java 9 16. Future Directions 17. Introduction 18. Managing Processes in Java 19. Duplicate File Finder 20. Date Calculator 21. Sunago - A Social Media Aggregator 22. Sunago - An Android Port 23. Email and Spam Management with MailFilter 24. Photo Management with PhotoBeans 25. Taking Notes with Monumentum 26. Serverless Java 27. DeskDroid - A Desktop Client for Your Android Phone 28. What is Next? 1. Bibliography
Index

Leveraging CPU instructions for GHASH and RSA


The self-descriptive title of Java Enhancement Proposal (JEP) 246, Leverage CPU Instructions for GHASH and RSA, provides great insight into its goal. The point of this JEP was to improve the performance of cryptographic operations, specifically GHASH and RSA. The performance improvement has been achieved in Java 9 by leveraging the newest SPARC and Intel x64 CPU instructions.

This enhancement did not require new or modified APIs as part of the Java 9 platform.

Hashing

Galois HASH (GHASH) and Rivest-Shamir-Adleman (RSA) are crypto systems hashing algorithms. Hashes are a fixed length string or number generated from a string of text. Algorithms, specifically hashing algorithms, are devised so that the resultant hashes cannot be reverse engineered. We use hashing to store passwords that are generated with a salt.

Note

Salts, in cryptology, are random data used as an input to a hashing function to generate a password. Salts help protect against rainbow...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image