Solved

pgp and java

Posted on 2002-07-22
8
383 Views
Last Modified: 2010-08-05
Hi expert,
i'm looking for a PGP java implementation that support stream, because i want to process very big files, cryptix doesnt support that, only in memory document. I looked at SlimPGP and XGP, they are not usable. So now i have 3 choice: Use a PGP software in command line, find a good java library or find a pgp daemon, i mean an application where i can connect thru tcp-ip, stream my file and receive the result from the socket.(i may be dreaming...)

Any suggestion?

Thanks
0
Comment
Question by:Kobold
8 Comments
 
LVL 51

Accepted Solution

by:
ahoffmann earned 100 total points
Comment Utility
becide the dreaming, AFAIK best is to start with a system (command-line) call within your java prog.
0
 
LVL 3

Expert Comment

by:gandalf94305
Comment Utility
Well, there are some alternatives:

- http://www.cryptography.ch/uni/pgpjava/ (JNI wrapper around PGP)

- http://www.cryptix.org/ (Cryptix suite of tools)

- finally, JCE (Java Cryptography Extension) is available from http://java.sun.com

Does that seem enough?

Cheers,
--gandalf
0
 
LVL 3

Author Comment

by:Kobold
Comment Utility
Finally, i'm using GnuPG with Runtime.getRuntime().exec("gpg -d..."), then i retrieve the process Input and output Stream to stream the file in and out, it's working well...

0
What Security Threats Are You Missing?

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

 
LVL 5

Expert Comment

by:zenlion420
Comment Utility
Hey people,

No comment has been added in roughly 1 year, so it's time to clean up this TA.
I will leave a recommendation in the Cleanup topic area that this question
be PAQ'd and pts refunded.
Please leave any comments here within the next seven days.

PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER!

Zenlion420
EE Page Editor
0
 
LVL 51

Expert Comment

by:ahoffmann
Comment Utility
disagreed
Kobold did (according last comment) exactly what I suggested
0
 
LVL 5

Expert Comment

by:zenlion420
Comment Utility
ahoffman,

I'm not familiar enough with the subject to have extracted the connection.  As of now, question will be PAQ'd and pts awarded to ahoffman.  If anyone disagrees, please state your reasoning within the next 7 days.  thanks,

j
0
 
LVL 51

Expert Comment

by:ahoffmann
Comment Utility
THANKS
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

Password hashing is better than message digests or encryption, and you should be using it instead of message digests or encryption.  Find out why and how in this article, which supplements the original article on PHP Client Registration, Login, Logo…
Big data transfers via information superhighways require special attention and protection. Learn more about the IT-regulations of the country where your server is located. Analyze cloud providers and their encryption systems for safe data transit. S…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now