You may get InvalidKeyException: Parameters missing error while performing AES encryption or decryption for password or any senstive information.
Learn to use Java AES 256 bit encryption to create secure passwords, and decryption for password validation. To read simple AES encryption, read linked post. 1. AES – Advanced Encryption Standard AES is a symmetric encryption algorithm. It was intended to be easy to implement in hardware and software, as well as in restricted environments […]
SSLHandshakeException appear in logs when there is some error occur while validating the certificate installed in client machine with certificate on server machine. In this post, we will learn about fixing this if you are using Apache HttpClient library to create HttpClient to connect to SSL/TLS secured URLs.
SSL issues are common while working on enterprise applications, but their debugging is not easy. Mostly due to not having enough information in logs. For example, you will get an exception like this for various reasons – I/O error: java.security.NoSuchAlgorithmException: Error constructing implementation. An exception stack trace may look like this: com.howtodoinjava.aav.exception.SystemException: I/O error: java.lang.RuntimeException: […]
To disable or bypass SSL Certificate checking is never a recommended solution for SSL issues, but at test environment – sometimes you may need this.
Java support many secure encryption algorithms but some of them are weak to be used in security-intensive applications. For example, the Data Encryption Standard (DES) encryption algorithm is considered highly insecure; messages encrypted using DES have been decrypted by brute force within a single day by machines such as the Electronic Frontier Foundation’s (EFF) Deep […]
Knowledge of how to secure REST APIs is as much important as to write the APIs itself. Mostly REST APIs are HTTP protocol based, and any user having internet connection can access them, and so can bad users as well. It is very important to write secure APIs to protect the business. Before starting to […]
In this tutorial, we will learn to set environment variables e.g. JAVA_HOME when you don’t have admin access to your development machine. This is very common scenario in companies with high security requirements like banks ( like mine :-) ). Open “User Accounts” Option You can locate this option by searching ‘accounts‘ or ‘user accounts‘ […]
Learn Java Secure Hashing algorithms in-depth. Java examples of MD5, SHA256, SHA512, PBKDF2, BCrypt, SCrypt algorithms with salt to create secure passwords.