1 00:00:00,330 --> 00:00:06,689 So in this video, let's try to discuss about one of the important package that provided by security, 2 00:00:06,689 --> 00:00:08,430 which is related to cryptography. 3 00:00:08,670 --> 00:00:16,140 So we call that package as overdue for spring framework security dot crypto inside this crypto package. 4 00:00:16,440 --> 00:00:23,860 We have many utility interfaces, glasses, implementations provided by spring security for various 5 00:00:23,860 --> 00:00:26,560 scenarios that we face on day to day basis. 6 00:00:26,880 --> 00:00:32,400 Suppose you want to generate a random key site then for such scenarios. 7 00:00:32,729 --> 00:00:39,890 We have a sample implementation, which is of a secure random Bychowski generator, which internally 8 00:00:39,930 --> 00:00:43,550 implements by design or to provide advice to bring security. 9 00:00:43,920 --> 00:00:52,110 So for all to read and stuff, we have this special package focusing for that and we have various classes 10 00:00:52,110 --> 00:00:56,090 and interfaces implemented inside this package. 11 00:00:56,430 --> 00:01:03,510 And at the same time, if you want to encrypt and decrypt the data for such scenarios, also we have 12 00:01:03,510 --> 00:01:13,440 a package called Encrypt Inside that we have various utility classes and methods interfaces which focusing 13 00:01:13,440 --> 00:01:16,900 on encryption and decryption of the data. 14 00:01:17,220 --> 00:01:23,310 So I just wanted to let you know, whenever you rise into such situations where you want to generate 15 00:01:23,310 --> 00:01:28,940 keys or encrypt and decrypt data, you don't have to depend on any other external library. 16 00:01:29,130 --> 00:01:35,430 You can always leverage spring security group package, which has all these implementations provided 17 00:01:35,670 --> 00:01:36,330 with that. 18 00:01:36,540 --> 00:01:42,360 We are done with the password encoder code and we clearly understand how this password encoded handles 19 00:01:43,140 --> 00:01:47,640 passwords, whether they are in plain text, encrypted or hash. 20 00:01:47,910 --> 00:01:53,880 So let's try to wrap up this section by discussing some of this action on a high level in the next room. 21 00:01:53,970 --> 00:01:54,410 Thank you. 22 00:01:54,420 --> 00:01:54,720 And by.