Upload
Download free for 30 days
Login
Submit search
Secure Java Applications against Quantum Threats
0 likes
101 views
Ana-Maria Mihalceanu
Technology
Read more
1 of 26
Download now
Download to read offline
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
More Related Content
PDF
Sullivan randomness-infiltrate 2014
Cloudflare
PDF
Emily Stamm - Post-Quantum Cryptography
CSNP
PPTX
Post-Quantum Encryption (PQE) refers to cryptographic algorithms and protocols
Rod Medallon
PPTX
Post Quantum Encryption Presentation by srm.pptx
Rod Medallon
PPTX
How to do Cryptography right in Android Part One
Arash Ramez
PDF
CNIT 141: 14. Quantum and Post-Quantum
Sam Bowne
PDF
Practical introduction to quantum-safe cryptography.pdf
hassanpak30
PDF
Modern Cryptography
James McGivern
Sullivan randomness-infiltrate 2014
Cloudflare
Emily Stamm - Post-Quantum Cryptography
CSNP
Post-Quantum Encryption (PQE) refers to cryptographic algorithms and protocols
Rod Medallon
Post Quantum Encryption Presentation by srm.pptx
Rod Medallon
How to do Cryptography right in Android Part One
Arash Ramez
CNIT 141: 14. Quantum and Post-Quantum
Sam Bowne
Practical introduction to quantum-safe cryptography.pdf
hassanpak30
Modern Cryptography
James McGivern
Similar to Secure Java Applications against Quantum Threats
(20)
PDF
Lec 4 Public Key Cryptography & Digital Identity 2022f.pdf
junaidkhalid631
PPT
Java Crypto
phanleson
PPT
Security via Java
Bahaa Zaid
PDF
CNIT 141: 14. Quantum and Post-Quantum
Sam Bowne
PDF
Post Quantum Cryptography: Technical Overview
Ramesh Nagappan
PDF
BlueHat v18 || Record now, decrypt later - future quantum computers are a pre...
BlueHat Security Conference
PPTX
CryptoGraphy Module in Mulesoft
shyamraj55
PPT
New ppt.ppt
ssuser4030a8
PDF
Post Quantum Cryptography - Emerging Frontiers
Gokul Alex
PDF
WEEK-2 (1).pdfdccccccccccccccccccccccccccccccccccc
deepak123mastermind
PPT
RSA
bansidhar11
ODP
Network Security Topic 4 cryptography2
Khawar Nehal
[email protected]
PPTX
Quantum cryptography by Girisha Shankar, Sr. Manager, Cisco
Vishnu Pendyala
PDF
Quantum_Safe_Crypto_Overview_v3.pdf
RonSteinfeld1
PPTX
Soumya Das post quantum crypot algorithm
soumyadastue
PPTX
post Quantum crypto alogorthm for beginer
soumyadastue
PDF
Quantum Knowledge Proofs and Post Quantum Cryptography - A Primer
Gokul Alex
PDF
When Crypto Attacks! (Yahoo 2009)
Nate Lawson
PPTX
Mulesoft Meetup Cryptography Module
ManjuKumara GH
PDF
CNIT 141 12. Elliptic Curves
Sam Bowne
Lec 4 Public Key Cryptography & Digital Identity 2022f.pdf
junaidkhalid631
Java Crypto
phanleson
Security via Java
Bahaa Zaid
CNIT 141: 14. Quantum and Post-Quantum
Sam Bowne
Post Quantum Cryptography: Technical Overview
Ramesh Nagappan
BlueHat v18 || Record now, decrypt later - future quantum computers are a pre...
BlueHat Security Conference
CryptoGraphy Module in Mulesoft
shyamraj55
New ppt.ppt
ssuser4030a8
Post Quantum Cryptography - Emerging Frontiers
Gokul Alex
WEEK-2 (1).pdfdccccccccccccccccccccccccccccccccccc
deepak123mastermind
RSA
bansidhar11
Network Security Topic 4 cryptography2
Khawar Nehal
[email protected]
Quantum cryptography by Girisha Shankar, Sr. Manager, Cisco
Vishnu Pendyala
Quantum_Safe_Crypto_Overview_v3.pdf
RonSteinfeld1
Soumya Das post quantum crypot algorithm
soumyadastue
post Quantum crypto alogorthm for beginer
soumyadastue
Quantum Knowledge Proofs and Post Quantum Cryptography - A Primer
Gokul Alex
When Crypto Attacks! (Yahoo 2009)
Nate Lawson
Mulesoft Meetup Cryptography Module
ManjuKumara GH
CNIT 141 12. Elliptic Curves
Sam Bowne
More from Ana-Maria Mihalceanu
(20)
PDF
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
PDF
Java 25 and Beyond - A Roadmap of Innovations
Ana-Maria Mihalceanu
PDF
Sécuriser les Applications Java Contre les Menaces Quantiques
Ana-Maria Mihalceanu
PDF
Des joyaux de code natif aux trésors Java avec jextract
Ana-Maria Mihalceanu
PDF
From native code gems to Java treasures with jextract
Ana-Maria Mihalceanu
PDF
Exciting Features and Enhancements in Java 23 and 24
Ana-Maria Mihalceanu
PDF
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
PDF
Enhancing Productivity and Insight A Tour of JDK Tools Progress Beyond Java 17
Ana-Maria Mihalceanu
PDF
From native code gems to Java treasures with jextract
Ana-Maria Mihalceanu
PDF
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
PDF
Java 23 and Beyond - A Roadmap Of Innovations
Ana-Maria Mihalceanu
PDF
Enhancing Productivity and Insight A Tour of JDK Tools Progress Beyond Java 17
Ana-Maria Mihalceanu
PDF
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
PDF
Java 22 and Beyond- A Roadmap of Innovations
Ana-Maria Mihalceanu
PDF
Surveillance de la sécurité des applications Java avec les outils du JDK e...
Ana-Maria Mihalceanu
PDF
A Glance At The Java Performance Toolbox
Ana-Maria Mihalceanu
PDF
Monitoring Java Application Security with JDK Tools and JFR Events.pdf
Ana-Maria Mihalceanu
PDF
Enhancing Productivity and Insight A Tour of JDK Tools Progress Beyond Java 17
Ana-Maria Mihalceanu
PDF
Java 21 Language Features and Beyond
Ana-Maria Mihalceanu
PDF
From Java 17 to 21- A Showcase of JDK Security Enhancements
Ana-Maria Mihalceanu
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
Java 25 and Beyond - A Roadmap of Innovations
Ana-Maria Mihalceanu
Sécuriser les Applications Java Contre les Menaces Quantiques
Ana-Maria Mihalceanu
Des joyaux de code natif aux trésors Java avec jextract
Ana-Maria Mihalceanu
From native code gems to Java treasures with jextract
Ana-Maria Mihalceanu
Exciting Features and Enhancements in Java 23 and 24
Ana-Maria Mihalceanu
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
Enhancing Productivity and Insight A Tour of JDK Tools Progress Beyond Java 17
Ana-Maria Mihalceanu
From native code gems to Java treasures with jextract
Ana-Maria Mihalceanu
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
Java 23 and Beyond - A Roadmap Of Innovations
Ana-Maria Mihalceanu
Enhancing Productivity and Insight A Tour of JDK Tools Progress Beyond Java 17
Ana-Maria Mihalceanu
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
Java 22 and Beyond- A Roadmap of Innovations
Ana-Maria Mihalceanu
Surveillance de la sécurité des applications Java avec les outils du JDK e...
Ana-Maria Mihalceanu
A Glance At The Java Performance Toolbox
Ana-Maria Mihalceanu
Monitoring Java Application Security with JDK Tools and JFR Events.pdf
Ana-Maria Mihalceanu
Enhancing Productivity and Insight A Tour of JDK Tools Progress Beyond Java 17
Ana-Maria Mihalceanu
Java 21 Language Features and Beyond
Ana-Maria Mihalceanu
From Java 17 to 21- A Showcase of JDK Security Enhancements
Ana-Maria Mihalceanu
Recently uploaded
(20)
PDF
Applying Agentic AI in Enterprise Automation
DianaGray10
PPT
Overviiew on Intellectual property right
Ritu Maity
PDF
ELLIE29.pdfWETWETAWTAWETAETAETERTRTERTER
ArlietsAmores
PDF
Human Computer Interaction Miterm Lesson
JasperGarcia9
PDF
CCUS-as-the-Missing-Link-to-Net-Zero_AksCurious.pdf
AkarshaSrivastava1
PDF
The Basics of Artificial Intelligence - Understanding the Key Concepts and Te...
FODUU
PDF
NewMind AI Journal Monthly Chronicles - August 2025
NewMind AI
PPTX
Strategic Picks — Prioritising the Right Agentic Use Cases [2/6]
suhanisingh58689
PDF
1_Keynote_Breaking Barriers_한계를 넘어서_Charith Mendis.pdf
AWS Korea 금융산업팀
PDF
Child-friendly e-learning for artificial intelligence education in Indonesia:...
IAESIJAI
PDF
State of AI in Business 2025 - MIT NANDA
Razin Mustafiz
PPTX
maintenance powerrpoint for adaprive and preventive
aladortigabu
PDF
Uncertainty-aware contextual multi-armed bandits for recommendations in e-com...
IAESIJAI
PPTX
Presentation - Principles of Instructional Design.pptx
Ntokozo Mhlongo
PDF
Ebook - The Future of AI A Comprehensive Guide.pdf
baljeethmata
PPTX
Report in SIP_Distance_Learning_Technology_Impact.pptx
KahelCaponesPamitang
PPTX
From Curiosity to ROI — Cost-Benefit Analysis of Agentic Automation [3/6]
suhanisingh58689
PDF
“Introduction to Designing with AI Agents,” a Presentation from Amazon Web Se...
Edge AI and Vision Alliance
PDF
Decision Optimization - From Theory to Practice
Eray Cakici
PDF
Slides World Game (s) Great Redesign Eco Economic Epochs.pdf
Steven McGee
Applying Agentic AI in Enterprise Automation
DianaGray10
Overviiew on Intellectual property right
Ritu Maity
ELLIE29.pdfWETWETAWTAWETAETAETERTRTERTER
ArlietsAmores
Human Computer Interaction Miterm Lesson
JasperGarcia9
CCUS-as-the-Missing-Link-to-Net-Zero_AksCurious.pdf
AkarshaSrivastava1
The Basics of Artificial Intelligence - Understanding the Key Concepts and Te...
FODUU
NewMind AI Journal Monthly Chronicles - August 2025
NewMind AI
Strategic Picks — Prioritising the Right Agentic Use Cases [2/6]
suhanisingh58689
1_Keynote_Breaking Barriers_한계를 넘어서_Charith Mendis.pdf
AWS Korea 금융산업팀
Child-friendly e-learning for artificial intelligence education in Indonesia:...
IAESIJAI
State of AI in Business 2025 - MIT NANDA
Razin Mustafiz
maintenance powerrpoint for adaprive and preventive
aladortigabu
Uncertainty-aware contextual multi-armed bandits for recommendations in e-com...
IAESIJAI
Presentation - Principles of Instructional Design.pptx
Ntokozo Mhlongo
Ebook - The Future of AI A Comprehensive Guide.pdf
baljeethmata
Report in SIP_Distance_Learning_Technology_Impact.pptx
KahelCaponesPamitang
From Curiosity to ROI — Cost-Benefit Analysis of Agentic Automation [3/6]
suhanisingh58689
“Introduction to Designing with AI Agents,” a Presentation from Amazon Web Se...
Edge AI and Vision Alliance
Decision Optimization - From Theory to Practice
Eray Cakici
Slides World Game (s) Great Redesign Eco Economic Epochs.pdf
Steven McGee
Secure Java Applications against Quantum Threats
1.
Secure Java Applications Against
Quantum Threats Ana-Maria Mihalceanu Senior Java Developer Advocate @ Oracle https://bsky.app/profile/ammbra1508.bsky.social https://mastodon.social/@ammbra1508 https://twitter.com/ammbra1508
2.
Goals Understand the urgency for
advancing quantum cryptography Explore solutions and standards Leverage JDK security to build resilient applications 2 Copyright © 2025, Oracle and/or its affiliates
3.
Why Quantum Cryptography Matters
Now ?
4.
Data Incident Involving
Your Personal Information “ We’re writing to inform you that some of your personal data shared with one of our contractors was involved in a recent security incident. The data was encrypted using industry-standard cryptographic methods. While the encrypted files were accessed by an unauthorized party, they remain undecipherable. We are actively investigating and reinforcing our systems for added protection. You do not need to take any action at this time, but we remain available for any questions.” 4 Copyright © 2025, Oracle and/or its affiliates
5.
The Math Behind
ECC Standard Elliptic Curve Cryptography (ECC) is a modern cryptographic approach based on the algebraic structure of elliptic curves over finite fields. y2=x3+ax+b mod p where a,b∈𝐹p and 4a3+27b2≠0 Finite Fields (Fp) Finite Fields operations are done modulo a prime p. 5 Copyright © 2025, Oracle and/or its affiliates Elliptic Curve Equation
6.
Copyright © 2025,
Oracle and/or its affiliates 6 Smaller Keys 256-bit ECC ≈ 3072-bit RSA Fast Calculations Faster computations and reduced resource usage. ECDSA Elliptic Curve Digital Signature Algorithm ECDH Elliptic Curve Diffie- Hellman for Secure Key Exchange Cryptographic Applications
7.
Harvest now, Decrypt
Later 7 Copyright © 2025, Oracle and/or its affiliates Source: https://pixabay.com/photos/keyboard-hands-hacker-hack-4356763/
8.
The Power of
Quantum Computers https://www.quantamagazine.org/john-preskill-explains- quantum-supremacy-20191002 https://cloudsecurityalliance.org/research/working- groups/quantum-safe-security 8 Copyright © 2025, Oracle and/or its affiliates | Confidential: Internal/Restricted/Highly Restricted
9.
A New Mathematical
Approach 9 Copyright © 2025, Oracle and/or its affiliates | Confidential: Internal/Restricted/Highly Restricted L={a⋅b1+b⋅b2 ∣ a,b ∈ 𝕫 }
10.
Copyright © 2025,
Oracle and/or its affiliates 10 Lattice A lattice is a discrete grid of points in ℝn, defined as integer combinations of linearly independent vectors. Module Lattice A module lattice generalizes this over polynomial rings. Lattice-Based KEMs Lattice-based KEMs rely on mathematical problems such as Learning With Errors or Ring Learning With Errors. NP-Hard These are NP- hard problems for quantum computers. Math Behind Module-Lattice Based Cryptography
11.
Growing Interest for
Quantum Resistant Cryptography 11 Copyright © 2025, Oracle and/or its affiliates Source: https://media.defense.gov/2022/Sep/07/2003071836/-1/-1/0/CSI_CNSA_2.0_FAQ_.PDF
12.
Towards (Post) Quantum Cryptography
13.
Hybrid Public Key
Encryption (HPKE) A new standard for public-key encryption that lets a sender encrypt arbitrary-length messages under a receiver’s public key. Can be either for pre-quantum or post-quantum secure communication. 13 Copyright © 2025, Oracle and/or its affiliates
14.
“HPKE works for
any combination of an asymmetric KEM, key derivation function (KDF), and authenticated encryption with additional data (AEAD) encryption function.” RFC 9180 on Hybrid Public Key Encryption 14 Copyright © 2025, Oracle and/or its affiliates
15.
Forward Thinking Security
Standards FIPS 203 A standard for general encryption, based on ML-KEM. FIPS 204 The primary standard for protecting digital signatures, based on ML-DSA. FIPS 205 Stateless Hash-Based Digital Signature Standard 15 Copyright © 2025, Oracle and/or its affiliates Source: https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards
16.
Advancing JDK Security Copyright
© 2025, Oracle and/or its affiliates 16 JEP 452: Key Encapsulation Mechanism API JDK 21 • JEP 478: Key Derivation Function API (Preview) • JEP 496: Quantum-Resistant Module-Lattice-Based Key Encapsulation Mechanism • JEP 497: Quantum-Resistant Module-Lattice-Based Digital Signature Algorithm JEP 510: Key Derivation Function API JDK 25 JDK 24
17.
Helpful JDK Tools
18.
Generate ML-KEM Key
Pairs with Keytool (Example) 18 Copyright © 2025, Oracle and/or its affiliates # generates a certificate signed with EC keytool -genkeypair -alias $SERVER_ALIAS -keyalg ec -validity 365 -keystore server.p12 -storepass $PASSWORD -keypass $PASSWORD # generate the ML-KEM key pair keytool -keystore server.p12 -storepass $PASSWORD -genkeypair -alias server-mlkem -keyalg ML-KEM-768 -signer $SERVER_ALIAS
19.
Generate ML-DSA Key
Pairs with Keytool (Example) 19 Copyright © 2025, Oracle and/or its affiliates keytool -genkeypair -alias server-mldsa -keyalg ML-DSA-44 -validity 365 -keystore server.p12 -storepass $PASSWORD -keypass $PASSWORD # or provide the parameter-set name, ML-DSA-44, directly via the -keyalg option: keytool -genkeypair -alias server-mldsa -keyalg ML-DSA -groupname ML-DSA-44 -validity 365 -keystore server.p12 -storepass $PASSWORD -keypass $PASSWORD
20.
Capture Relevant Details
About X.509 Certificates with JFR 20 Copyright © 2025, Oracle and/or its affiliates # enable jdk.X509Certificate and jdk.X509Validation options in your JFR config file <event name="jdk.X509Certificate"> <setting name="enabled">true</setting> <setting name="stackTrace">true</setting> </event> <event name="jdk.X509Validation"> <setting name="enabled">true</setting> <setting name="stackTrace">true</setting> </event> # or run jfr configure command in a terminal window $JAVA_HOME/bin/jfr configure jdk.X509Certificate#enabled=true jdk.X509Validation#enabled=true
21.
Inspect Successful TLS
Handshakes 21 Copyright © 2025, Oracle and/or its affiliates # start a recording jcmd llvmid JFR.start duration=60s filename=/tmp/TLS.jfr # use jfr print command $JAVA_HOME/bin/jfr print --events "TLS*" /tmp/TLS.jfr jdk.TLSHandshake { ... peerHost = "google.com" peerPort = 8443 protocolVersion = "TLSv1.3" cipherSuite = "TLS_AES_128_GCM_SHA256" ... }
22.
Don’t Forget to
Scrub Sensitive Data 22 Copyright © 2025, Oracle and/or its affiliates # Filter data from the specified recording file. jfr scrub [filters] [recording-file] [output-file] # Supply which events to include. jfr scrub --include-events jdk.X509Certificate,jdk.X509Validation rec.jfr # Include a category and exclude events. jfr scrub --include-categories Security --exclude-events jdk.X509Validation rec.jfr # Remove all events by category jfr scrub --exclude-categories Security rec.jfr
23.
What’s Next for
You? Audit your encrypted assets. Take care of your application by updating it to a recent JDK. Don’t assume encrypted = safe (forever). 23 Copyright © 2025, Oracle and/or its affiliates
24.
Stay Tuned For
More! 24 Copyright © 2025, Oracle and/or its affiliates inside.java youtube.com/java dev.java
25.
Demo Code 25 Copyright
© 2025, Oracle and/or its affiliates
26.
Thank you Copyright ©
2025, Oracle and/or its affiliates 26
Download