In this video Graham explains the PKCS#12 keystore. It's a little different from the other keystores we've covered so far in this series because it's an interoperable format. Originally designed by RSA in 1999 so it contains more modern cryptography than JKS or JCEKS. Oracle now recommend that you use PKCS#12 as your Java keystore, rather than using the old Java specific ones.
Even though it does contain support for strong cryptography such as AES and PBKDF2, you still need to be careful how your application uses this keystore.
You can find some more info on Neil Maddens' blog: [ Ссылка ]
Also our blog: [ Ссылка ]
Part 1 - Java JKS Keystore [ Ссылка ]
Part 2 - JCEKS [ Ссылка ]
Part 4 - Bouncy Castle BKS [ Ссылка ]
Part 5 - Bouncy Castle UBER [ Ссылка ]
Part 6 - Bouncy Castle FIPS Keystore (BCFKS) [ Ссылка ]
/////
Find out more about Cryptosense: [ Ссылка ]
Follow us on Twitter: [ Ссылка ]
/////
Cryptosense CEO Dr. Graham Steel was formerly an academic researcher before founding Cryptosense in 2013. His cryptography expertise is the basis for the company's 'Analyzer' technology which allows customers to protect themselves against losing sensitive data.
Explaining Keystores | Part 3 - PKCS#12
Теги
cryptographyapplication securityprevent data lossdata securitycloud data securitydata security compliancecryptography compliancesecure post-quantum cryptographydevops securityprotect sensitive datacryptography auditget cryptography testing in CI/CDautomate cloud security auditcloud cryptographykeystorespkcs12 keystoreRSA encryptionsecure keystores