Using PyCrypto with Spring Crypto/Spring Security Default Encoders

Spring Crypto Encryptor Details The Spring Crypto module is amazing. Secure defaults using standard interfaces really make it a pleasure to use, and with it being full tested and vetted, it also gives a develoepr the warm fuzzy feelings of nice Java security implentation. The standard interface is through the  org.springframework.security.crypto.encrypt.Encryptors class, defined (in version 3.2.0 here (the class API to which this blog post was written in July 2016). Spring Crypto uses AES256 encryption behind the scenes in its out of the box class setup; it's as easy as: In the above code snippet, the password  variable is a passcode, with the salt  variable used to create the AES key. It uses 256 bit encryption with the standard calls (depending on your JRE/Java Cryptography Extension (JCE) Setup, make sure to download the appropriate extension ). The default AESBytesEncryptor setup generates a 256 bit key (32 bytes) from a salted iteration done 1024 times. Another th

Frustrated Database

Someone make an XQuery (namespace) IDE plugin for Eclipse. Shit, google just provided one...

Update: I just realized how horrible the XQuery specification is implemented in any sort of off-the-shelf packages. We used QuiP (Note the use of caP1+Als) for a CSCI 585:Databases homework assignment. It sucked, especially since the syntax we learned in class and documented in the notes was the 04 APR 2005 Specification while on the QuiP site they have this gem:

"The latest XQuery draft was released in May 2003 and though there have been no substantial changes, the syntax supported by the current QuiP implementation must be considered out of date."

Pretty sweet when you're writing software and have to figure out the syntax by trial-and-error.

Comments

Popular posts from this blog

Spring Framework Sample Main Method

My Yahoo! Answers Science Post