• Java
    • JAXB Tutorial
      • What is JAXB
      • JAXB Marshalling Example
      • JAXB UnMarshalling Example
  • Spring Tutorial
    • Spring Core Tutorial
    • Spring MVC Tutorial
      • Quick Start
        • Flow Diagram
        • Hello World Example
        • Form Handling Example
      • Handler Mapping
        • BeanNameUrlHandlerMapping
        • ControllerClassNameHandlerMapping
        • SimpleUrlHandlerMapping
      • Validation & Exception Handling
        • Validation+Annotations
        • Validation+ResourceBundle
        • @ExceptionHandler
        • @ControllerAdvice
        • Custom Exception Handling
      • Form Tag Library
        • Textbox Example
        • TextArea Example
        • Password Example
        • Dropdown Box Example
        • Checkboxes Example
        • Radiobuttons Example
        • HiddenValue Example
      • Misc
        • Change Config file name
    • Spring Boot Tutorial
  • Hibernate Tutorial
  • REST Tutorial
    • JAX-RS REST @PathParam Example
    • JAX-RS REST @QueryParam Example
    • JAX-RS REST @DefaultValue Example
    • JAX-RS REST @Context Example
    • JAX-RS REST @MatrixParam Example
    • JAX-RS REST @FormParam Example
    • JAX-RS REST @Produces Example
    • JAX-RS REST @Consumes Example
    • JAX-RS REST @Produces both XML and JSON Example
    • JAX-RS REST @Consumes both XML and JSON Example
  • Miscellaneous
    • JSON Parser
      • Read a JSON file
      • Write JSON object to File
      • Read / Write JSON using GSON
      • Java Object to JSON using JAXB
    • CSV Parser
      • Read / Write CSV file
      • Read/Parse/Write CSV File – OpenCSV
      • Export data into a CSV File
      • CsvToBean and BeanToCsv – OpenCSV

JavaInterviewPoint

Java Development Tutorials

Google Tink Example – Google Cryptography

November 27, 2018 by javainterviewpoint Leave a Comment

Google released its Cryptographic library Google Tink on August 2018, it was a multi-language, cross-platform cryptographic library. At present Google Tink Cryptography API supports the 4 fundamental cryptographic operations or primitives including Authenticated Encryption with Associated Data (AEAD), Message Authentication Code (MAC), Digital Signature (PublicKeySign and PublicKeyVerify), and Hybrid Encryption (HybridEncrypt and HybridDecrypt). In this Google Tink example, we will learn how to implement AEAD Primitive.

Google Tink ExampleIn order to use Google Tink Cryptography API we need to have the “tink-1.2.1.jar” and “protobuf-java-3.6.1.jar” dependencies added in your project.

If you are running on maven add the below dependency to your pom.xml

<dependency>
  <groupId>com.google.crypto.tink</groupId>
  <artifactId>tink</artifactId>
  <version>1.2.1</version>
</dependency>
<dependency>
    <groupId>com.google.protobuf</groupId>
    <artifactId>protobuf-java</artifactId>
    <version>3.6.1</version>
</dependency>

Google Tink Example – Google Cryptography

Authenticated Encryption with Associated Data (AEAD) provides functionality of Symmetric Authenticated Encryption, where the same key is use for encryption as well as decryption. When encrypting a plaintext one can optionally provide associated data that should be authenticated but not encrypted.

In our below code, we will be encrypting the plain text “Google Cryptography – Google Tink Example” with the key “secretKey”.

package com.javainterviewpoint;

import java.security.GeneralSecurityException;

import com.google.crypto.tink.Aead;
import com.google.crypto.tink.KeysetHandle;
import com.google.crypto.tink.aead.AeadConfig;
import com.google.crypto.tink.aead.AeadFactory;
import com.google.crypto.tink.aead.AeadKeyTemplates;
import com.google.crypto.tink.proto.KeyTemplate;

public class GoogleTinkExample
{
    public static void main(String[] args) throws GeneralSecurityException
    {
        // Initialize Aead through registration
        AeadConfig.register();
        try
        {
            // Get the KeyTemplate [AES256_EAX]
            KeyTemplate keyTemplate = AeadKeyTemplates.AES256_EAX;

            // Generate KeySetHandle
            KeysetHandle keysetHandle = KeysetHandle.generateNew(keyTemplate);

            // Obtain the primitive Aead
            Aead aead = AeadFactory.getPrimitive(keysetHandle);

            String plaintext = "Google Cryptography - Google Tink Example";
            String aad = "secretKey";

            System.out.println("Before Encryption: " + plaintext);

            // Encrypting the plaintext
            byte[] ciphertext = aead.encrypt(plaintext.getBytes(), aad.getBytes());
            System.out.println("Cipher:" + ciphertext.toString());

            // Decrypting the plaintext
            byte[] decrypted = aead.decrypt(ciphertext, aad.getBytes());
            String decryptedText = new String(decrypted);
            System.out.println("After Decryption: " + decryptedText);

        } catch (GeneralSecurityException e)
        {
            System.out.println(e);
            System.exit(1);
        }
    }
}
  • Tink provides customizable initialization and we can choose the specific implementations of primitive, in our we will be using AeadConfig implementation.
AeadConfig.register();
  • If you need to use all the implementation of all the primitives then we need to use “TinkConfig”.
TinkConfig.register();
  • We have used AES256_EAX as our KeyTemplate.
 KeyTemplate keyTemplate = AeadKeyTemplates.AES256_EAX;
  • Obtain the KeysetHandle instance by calling the generateNew() method passing the KeyTemplate.
KeysetHandle keysetHandle = KeysetHandle.generateNew(keyTemplate);
  • We will get the Aead primitive by calling the getPrimitive() on top of AeadFactory passing the KeysetHandle.
Aead aead = AeadFactory.getPrimitive(keysetHandle);
  • We can encrypt the plaintext by calling the encrypt() method on top of Aead class, we will be passing the plaintext and aad as the parameter.
byte[] ciphertext = aead.encrypt(plaintext.getBytes(), aad.getBytes());
  • We will decrypt the ciphertext by calling the decrypt() method on top of Aead class, we will be passing the ciphertext and aad as the parameter.
byte[] decrypted = aead.decrypt(ciphertext, aad.getBytes());

Other interesting articles which you may like …

  • AES 256 Encryption and Decryption
  • AES 128 Encryption and Decryption
  • Constructor in Java
  • Private Constructors in Java
  • Java Constructor Chaining with example
  • Java – Constructor in an Interface?
  • Constructor.newInstance() method
  • Parameterized Constructor in Java
  • Java 8 – Lambda Expressions
  • Java 8 – ForEach Example
  • Java 8 Default Methods in Interface
  • Multiple Inheritance in Java 8 through Interface
  • Java 9 – jdeprscan
  • Private Methods in Interfaces Java 9
  • Java Method Overloading Example
  • Java Constructor Overloading Example
  • Java this keyword | Core Java Tutorial
  • Java super keyword
  • Abstract Class in Java
  • Interface in Java and Uses of Interface in Java
  • What is Marker Interface
  • Serialization and Deserialization in Java with Example
  • Generate SerialVersionUID in Java
  • Java Autoboxing and Unboxing Examples
  • Use of Java Transient Keyword – Serailization Example
  • Use of static Keyword in Java
  • What is Method Overriding in Java
  • Encapsulation in Java with Example
  • Final Keyword in Java | Java Tutorial
  • Java Static Import
  • Java – How System.out.println() really work?
  • Java Ternary operator
  • Java newInstance() method

Filed Under: Core Java, Java Tagged With: Google cryptographic library, Google Cryptography, Google Tink, Google Tink Example

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Java Basics

  • JVM Architecture
  • Object in Java
  • Class in Java
  • How to Set Classpath for Java in Windows
  • Components of JDK
  • Decompiling a class file
  • Use of Class.forName in java
  • Use Class.forName in SQL JDBC

Oops Concepts

  • Inheritance in Java
  • Types of Inheritance in Java
  • Single Inheritance in Java
  • Multiple Inheritance in Java
  • Multilevel Inheritance in Java
  • Hierarchical Inheritance in Java
  • Hybrid Inheritance in Java
  • Polymorphism in Java – Method Overloading and Overriding
  • Types of Polymorphism in java
  • Method Overriding in Java
  • Can we Overload static methods in Java
  • Can we Override static methods in Java
  • Java Constructor Overloading
  • Java Method Overloading Example
  • Encapsulation in Java with Example
  • Constructor in Java
  • Constructor in an Interface?
  • Parameterized Constructor in Java
  • Constructor Chaining with example
  • What is the use of a Private Constructors in Java
  • Interface in Java
  • What is Marker Interface
  • Abstract Class in Java

Java Keywords

  • Java this keyword
  • Java super keyword
  • Final Keyword in Java
  • static Keyword in Java
  • Static Import
  • Transient Keyword

Miscellaneous

  • newInstance() method
  • How does Hashmap works internally in Java
  • Java Ternary operator
  • How System.out.println() really work?
  • Autoboxing and Unboxing Examples
  • Serialization and Deserialization in Java with Example
  • Generate SerialVersionUID in Java
  • How to make a class Immutable in Java
  • Differences betwen HashMap and Hashtable
  • Difference between Enumeration and Iterator ?
  • Difference between fail-fast and fail-safe Iterator
  • Difference Between Interface and Abstract Class in Java
  • Difference between equals() and ==
  • Sort Objects in a ArrayList using Java Comparable Interface
  • Sort Objects in a ArrayList using Java Comparator

Follow

  • Coding Utils

Useful Links

  • Spring 4.1.x Documentation
  • Spring 3.2.x Documentation
  • Spring 2.5.x Documentation
  • Java 6 API
  • Java 7 API
  • Java 8 API
  • Java EE 5 Tutorial
  • Java EE 6 Tutorial
  • Java EE 7 Tutorial
  • Maven Repository
  • Hibernate ORM

About JavaInterviewPoint

javainterviewpoint.com is a tech blog dedicated to all Java/J2EE developers and Web Developers. We publish useful tutorials on Java, J2EE and all latest frameworks.

All examples and tutorials posted here are very well tested in our development environment.

Connect with us on Facebook | Privacy Policy | Sitemap

Copyright ©2023 · Java Interview Point - All Rights Are Reserved ·