Java Reference
In-Depth Information
For more information on ProGuard and its options, consult the documentation, which is
quite good. For another example of its use, see http://developers.sun.com/techtopics/
mobility/midp/articles/security3/ .
The results are impressive. Without the obfuscator, the MIDlet JAR containing StealthMIDlet
is 699KB. After running ProGuard, the MIDlet JAR is 32KB and the offending java.* classes
have been renamed to something innocuous.
Summary
Data security is crucial for some types of applications. Data security is feasible in the MIDP
world using the Bouncy Castle cryptography package, which provides sophisticated, accessible,
industrial-strength cryptography for the MIDP platform. This example presented two possible
applications—one using a message digest for secure password authentication, and the other
using ciphers to encrypt data sent between a MIDlet and a servlet.
Keep in mind that adding cryptography to an application or system won't necessarily
make it more secure. You need to take a comprehensive system-level approach to security.
Cryptography is just one of the tools in your box.
Search WWH ::




Custom Search