Securing API Keys Using Public-Key Cryptography on Android

Online course teaching how to protect API keys with public-key cryptography techniques on Android devices. Enroll via Stevdza-san's website or Udemy.

Stevdza-San3.6K views1:53

🔥 Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Turkey under the topic 'bursa deprem'.

About this video

🏆 Online Course: https://stevdza-san.com/p/secure-api-keys-with-a-public-key-cryptography-on-android Udemy: https://www.udemy.com/course/secure-api-keys-with-a-public-key-cryptography-on-android/?referralCode=BA02B896C8C2DE00A0A7 In this short-length course I will teach you how to securely store API keys in your Android App, without exposing them to the public. With the help of a Public Key Cryptography, Android Keystore System, Encrypted Shared Preferences and our own Backend server, you will achieve exactly that. Public key cryptography, also known as asymmetric cryptography, is a cryptographic approach that uses key pair: public key and private key. Each key pair consists of a public key and a private key that are mathematically related but cannot be derived one from another. This approach will help us to securely exchange the data between a client and a server. API Keys will be initially stored securely on our backend Server. The server and the client will exchange the public key, to encrypt the data, before sending it back to the client. That way we can make sure that no one can read the actual data which is exchanged. Only our Android application will hold the private key to decrypt the data, and securely  store the API keys on a device. Android Keystore system is a part of the Android operating system that provides a secure storage facility for cryptographic keys, certificates, and related information. It is designed to protect sensitive data, such as private keys used for encryption and authentication, from unauthorized access. I will provide you with some more detailed information about the Keystore System itself and how does it work. We will utilize that system to securely store the Public Key Pair that is going to be generated for us. So what are you waiting for, let's get started!

Video Information

Views
3.6K

Total views since publication

Likes
107

User likes and reactions

Duration
1:53

Video length

Published
Dec 26, 2023

Release date

Quality
hd

Video definition

Tags and Topics

This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:

Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.