PKIT is a Java toolkit for performing common PKI related tasks. It currently can be used to sign a cert in a well formed manner for various uses: non repudiation, key encipherment, data encipherment, cert signing, generating certifcate reqequests, importing and exporting certs from keystores similar to 'keytool', and converting keystores from one format to another.
Better ASN is a Java ASN.1 API that focuses on speed and efficiency rather than extended functionality. This strategy prescribes one-pass decoding and near 100% encoding efficiency for typical ASN.1 usage patterns. Although BASN was developed for use by a Certificate Authority, the release comes packaged with an ASN.1 to Java compiler, which can be used to generate Java implementations of ASN.1 structures. This allows the API to be used for any Java application that may require ASN.1 decoding/manipulation/encoding.
Maverick is a professional-level Java SSH API that is based upon the popular open source J2SSH library. It features support for both SSH1 and SSH2 protocols and compilation under JDK versions 1.1+, including the latest J2ME Java Mobile Platform. It also provides a range of performance enhancements with no dependencies, a single-threaded architecture, and improved file transfer rates.
Ganymed SSH-2 for Java is a library that implements the SSH-2 protocol in pure Java (tested on J2SE 1.4.2, 5, and 6). It allows one to connect to SSH servers from within Java programs. It supports SSH sessions (remote command execution and shell access), local and remote port forwarding, local stream forwarding, X11 forwarding, SCP, and SFTP. There are no dependencies on any JCE provider, as all cryptographic functionality is included.
jBCrypt is a Java implementation of OpenBSD's Blowfish password hashing code, as described in "A Future-Adaptable Password Scheme" by Niels Provos and David Mazières. This system hashes passwords using a version of Bruce Schneier's Blowfish block cipher, with modifications designed to raise the cost of off-line password cracking and frustrate fast hardware implementation. The computation cost of the algorithm is parametised, so it can be increased as computers get faster. The intent is to make a compromise of a password database less likely to result in an attacker gaining knowledge of the plaintext passwords.