Printer Friendly
The Free Library
22,738,802 articles and books

RSA SECURITY DEBUTS ENCRYPTION SOFTWARE FOR JAVA APPLICATIONS.



Raising the bar for Java SSL (Secure Sockets Layer) The leading security protocol on the Internet. Developed by Netscape, SSL is widely used to do two things: to validate the identity of a Web site and to create an encrypted connection for sending credit card and other personal data.  technology, RSA Security Inc. (Nasdaq: RSAS RSAS RSA Security, Inc. (stock abbreviation, AMEX)
RSAS Royal Swedish Academy of Sciences
RSAS RAND Strategy Assessment System
RSAS Reactor Safety Assessment System
), Bedford, Mass., has introduced a new version of RSA (1) (Rural Service Area) See MSA.

(2) (Rivest-Shamir-Adleman) A highly secure cryptography method by RSA Security, Inc., Bedford, MA (www.rsa.com), a division of EMC Corporation since 2006. It uses a two-part key.
 BSAFE SSL-J, the latest release of RSA Security's Java- based Secure Socket Layer (SSL) and Transport Layer Security (TLS (1) (Transport Layer Security) A security protocol from the IETF that is based on the Secure Sockets Layer (SSL) 3.0 protocol developed by Netscape. TLS uses digital certificates to authenticate the user as well as authenticate the network (in a wireless ) security software offering trusted RSA Security encryption. This industry-leading encryption software is designed to provide transaction privacy, data integrity and authentication, and to offer everything needed to meet Java developers' security protocol requirements.

"Today's announcement reflects the evolving needs of our customers, and reinforces RSA Security's commitment to providing Java developers with all of the tools they need to quickly and easily add security to their applications," said Scott Schnell, senior vice president of marketing at RSA Security. "Building on earlier versions of RSA BSAFE SSL-J, the latest release is one of the industry's most comprehensive packaged security component solutions on the market today, and is ideal for enterprises working in the Java environment."

The new RSA BSAFE SSL-J 3.1 software incorporates a number of important new features and benefits for the Java developer community:

-- RSA BSAFE(R) SSL-J software supports version 2 of the Secure Socket Layer (SSL) protocol, in addition to the product's existing support for SSL version 3 and TLS version. As a result, enterprises can benefit from RSA Security's leading encryption technology, while maintaining maximum interoperability.

-- RSA BSAFE software is designed to allow developers to create a complete SSL version 3 client with only 150K of code. This means that full-strength security can be easily included in applets, embedded applications and other environments where download size is critical.

-- RSA BSAFE SSL-J 3.1 software is designed to enable developers to select their own SSL parameters, such as cipher cipher: see cryptography.


(1) The core algorithm used to encrypt data. A cipher transforms regular data (plaintext) into a coded set of data (ciphertext) that is not reversible without a key.
 suites, SSL versions and compression methods. This provides companies with greater development control, which, in turn, can lead to a reduction in development time and a shortened time to market.

-- RSA BSAFE SSL-J software is designed to integrate easily with RSA BSAFE Cert-J to make certificate revocation list In the operation of some cryptosystems, usually public key infrastructures (PKIs), a certificate revocation list (CRL) is a list of certificates (more accurately: their serial numbers) which have been revoked, are no longer valid, and should not be relied on by any system user.  (CRL CRL - Carnegie Representation Language.

Carnegie Group, Inc. Frame language derived from SRL. Written in Common LISP. Used in the product Knowledge Craft.
) support, and other higher-level certificate functionality, easier to administer and support.

Transport Layer Security

The Transport Layer Security (TLS) protocol is an improved and standardized version of Secure Sockets Layer (networking, security) Secure Sockets Layer - (SSL) A protocol designed by Netscape Communications Corporation to provide secure communications over the Internet using asymmetric key encryption.  (SSL), the de facto [Latin, In fact.] In fact, in deed, actually.

This phrase is used to characterize an officer, a government, a past action, or a state of affairs that must be accepted for all practical purposes, but is illegal or illegitimate.
 Internet protocol for session-based encryption and authentication. As defined by the IETF See Internet Engineering Task Force.

IETF - Internet Engineering Task Force
, TLS is a general-purpose protocol for providing a secure communications channel between two parties with server and client authentication, application interoperability, improved performance and an extensible framework for incorporating new encryption and authentication technologies as needed.

TLS is currently supported by major Web browsers and servers and is used by many industry-leading software and hardware companies to incorporate secure communications within their applications. Users of TLS include business, government and services development organizations and independent software vendors (ISVs) for creating a wide variety of applications requiring communications security, including electronic commerce and financial transactions, electronic data interchange See EDI.

(application, communications) electronic data interchange - (EDI) The exchange of standardised document forms between computer systems for business use. EDI is part of electronic commerce.
, LDAP (Lightweight Directory Access Protocol) A protocol used to access a directory listing. LDAP support is implemented in Web browsers and e-mail programs, which can query an LDAP-compliant directory.  directory services, database connectivity, groupware and collaborative applications, terminal emulation and many others.

Availability

Runtime licenses for products and support using RSA BSAFE SSL-J 3.1 are available now on a royalty, per-seat or annual fee basis.

About RSA Security Inc.

RSA Security Inc., The Most Trusted Name in e-Security(TM), helps organizations build secure, trusted foundations for e-business through its RSA SecurID(R) two-factor authentication, RSA BSAFE(R) encryption and RSA Keon(R) digital certificate management systems. With more than a half billion RSA BSAFE-enabled applications in use worldwide, more than six million RSA SecurID users and almost 20 years of industry experience, RSA Security has the proven leadership and innovative technology to address the changing security needs of e-business and bring trust to the new, online economy.

For more information, visit www.rsasecurity.com or call 781-301-5344.
COPYRIGHT 2000 Worldwide Videotex
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2000 Gale, Cengage Learning. All rights reserved.

 Reader Opinion

Title:

Comment:



 

Article Details
Printer friendly Cite/link Email Feedback
Publication:Computer Security Update
Article Type:Product Announcement
Geographic Code:1USA
Date:Jul 1, 2000
Words:615
Previous Article:UNITED WISCONSIN UNDERGOES E&Y SECURITY CERTIFICATION PROCESS.
Next Article:RSA/DIVERSINET FORM ALLIANCE FOR WIRELESS DEVELOPMENT.
Topics:



Related Articles
PKI VENDOR CELO COMMUNICATIONS SETTLES INTO AMERICA.
RSA Updates Java Security Products.
Certicom Rolls Out New Version Of SSL Cryptography.
FAR-REACHING CONTRACT GIVES HP BROAD ACCESS TO RSA SECURITY ENCRYPTION TECHNOLOGY.
RSA SECURITY EXPANDS WIRELESS, EMBEDDED SECURITY OFFERINGS.
RSA SECURITY\WEB CROSSING PROVIDE SECURITY FOR WEB COMMUNITIES.
RSA BSAFE ENCRYPTION SOFTWARE EARNS FIPS 140-1 CERTIFICATION.
RSA SECURITY LAUNCHES RSA SURE FILE SOFTWARE POWERED BY PKZIP.
RSA BESAFE SECURITY SOFTWARE ENABLES HARDWARE ACCELERATION.
CAVIUM NETWORKS ADDS JCE SOFTWARE SUPPORT TO SOFTWARE OFFERING.

Terms of use | Copyright © 2014 Farlex, Inc. | Feedback | For webmasters