Jasypt 1.4 released: encrypt your configuration files
Jasypt 1.4 has been released. Jasypt (Java Simplified Encryption) [http://www.jasypt.org] is a library aimed at providing developers a simple way to add encryption capabilities to their projects including: password digesting, text/binary encryption, Hibernate transparent encryption and Spring Security (ACEGI) integration.
What's new in 1.4:
<ul>
<li> Encryptable .properties files (including Spring propertyplaceholder integration).</li>
<li> Encryptable Hibernate datasource configuration.</li>
<li> Command line tools.</li>
<li> Apache Wicket integration for URL encryption.</li>
<li> Updated docs (including Jasypt + Seam 2 integration guide) </li>
</ul>
Jasypt's main features:
<ul>
<li> Jasypt follows the RSA standards for password-based cryptography, and provides you with both unidirectional and bidirectional encryption techniques. </li>
<li> Open API for use with any JCE provider, and not only the default Java VM one. Jasypt can be easily used with well-known providers like Bouncy Castle.</li>
<li> Higher security for your users' passwords.</li>
<li> Binary encryption support. Jasypt allows the digest and encryption of binaries (byte arrays). Encrypt your objects or files when needed (for being sent over the net, for example).</li>
<li> Number encryption support. Besides texts and binaries, it allows the digest and encryption of numeric values (BigInteger and BigDecimal, other numeric types are supported when encrypting for Hibernate persistence).</li>
<li> Completely thread-safe.</li>
<li> Provides both easy, no-configuration encryption tools for users new to encryption, and also highly configurable standard encryption tools, for power-users.</li>
<li> Hibernate 3 optional integration for persisting fields of your mapped entities in an encrypted manner. Encryption of fields is defined in the Hibernate mapping files, and it remains transparent for the rest of the application (useful for sensitive personal data, databases with many read-enabled users...). Encrypt texts, binaries, numbers, booleans, dates...</li>
<li> Seamlessly integrable into a Spring application. All the digesters and encryptors in jasypt are designed to be easily used (instantiated, dependency-injected...) from Spring. And, because of their being thread-safe, they can be used without synchronization worries in a singleton-oriented environment like Spring.</li>
<li> Spring Security (Acegi Security) optional integration for performing password encryption and matching tasks for the security framework, improving the security of your users' passwords by using safer password encryption mechanisms and providing you with a higher degree of configuration and control.</li>
<li> Provides advanced functionality for encrypting all or part of an application's configuration files, including sensitive information like database passwords. Seamlessly integrate encrypted configuration into plain, Spring-based and/or Hibernate-enabled applications.</li>
<li> Provides easy to use CLI (Command Line Interface) tools to allow developers initialize their encrypted data and include encryption/decryption/digest operations in maintenance tasks or scripts.</li>
<li> Comprehensive guides and javadoc documentation, to allow developers to better understand what they are really doing to their data.</li>
<li> Robust charset support, designed to adequately encrypt and digest texts whichever the original charset is. Complete support for languages like Japanese, Korean, Arabic... with no encoding or platform issues.</li>
<li> Very high level of configuration capabilities: The developer can implement tricks like instructing an "encryptor" to ask a, for example, remote HTTPS server for the password to be used for encryption. It lets you meet your security needs. </li>
</ul>
Visit the project's website at: http://www.jasypt.org