Oracle Advanced Security continues to encrypt and provide integrity checking of
Oracle Net Services traffic between Oracle Net clients and Oracle servers using
algorithms written in C. The Oracle Advanced Security Java implementation
provides Java versions of the following encryption algorithms:
In addition, this implementation provides data integrity checking for Thin JDBC
using Message Digest 5 (MD5), a cryptographically secure message digest.
Implementation Overview
On the server side, the negotiation of algorithms and the generation of keys
function exactly the same as Oracle Advanced Security native encryption. This
enables backward and forward compatibility of clients and servers.
On the client side, the algorithm negotiation and key generation occur in exactly the
same manner as C-based Oracle Advanced Security encryption. The client and
server negotiate encryption algorithms, generate random numbers, use
Diffie-Hellman to exchange session keys, and use the Oracle Password Protocol
(O3LOGON key fold-in), in the same manner as traditional Oracle Net clients. Thin
JDBC contains a complete implementation of a Oracle Net client in pure Java.
Obfuscation
Java cryptography code is obfuscated in this release. Obfuscation protects Java
classes and methods that contain encryption and decryption capabilities with
obfuscation software.
Java byte code
property written in the form of Java programs. It mixes up Java symbols found in
RC4_256
RC4_128
RC4_56
RC4_40
DES56
DES40
In Oracle Advanced Security, DES runs in Cipher Block
Note:
Chaining (CBC) mode.
obfuscation
Configuring Network Data Encryption and Integrity for Thin JDBC Clients 4-3
is a process frequently used to protect intellectual
About the Java Implementation
Need help?
Do you have a question about the Oracle Database B10772-01 and is the answer not in the manual?