Java Cryptographic Scanning
Scan Java codebases for cryptographic usage — detect JCA/JCE algorithms, Bouncy Castle operations, and deprecated crypto across your Java applications.
Overview
QCecuring’s CBOM scanner analyzes Java source code to discover all cryptographic operations — from the standard JCA/JCE framework to third-party libraries like Bouncy Castle, Google Tink, and Apache Shiro. The scanner identifies algorithm strings, key sizes, cipher transformations, and deprecated patterns across your Java application portfolio.
Key capabilities
- Detect
Cipher.getInstance(),KeyGenerator.getInstance(),MessageDigest.getInstance()calls and extract algorithm strings. - Scan
KeyPairGeneratorusage for RSA, EC, DSA key generation with key size parameters. - Identify
SSLContextandSSLSocketFactoryconfigurations for TLS versions and cipher suites. - Analyze Bouncy Castle API usage for low-level crypto operations and algorithm selection.
- Detect deprecated algorithms: DES, 3DES, RC4, MD5, SHA-1 in signature contexts.
- Scan
pom.xml,build.gradle, andbuild.gradle.ktsfor crypto library dependencies and versions. - Identify Java KeyStore (JKS, PKCS#12) operations and certificate handling patterns.
Typical use cases
- Enterprise teams auditing large Java codebases for cryptographic compliance before PQC migration.
- Security teams scanning Spring Boot, Jakarta EE, and Android applications for weak crypto.
- Compliance programs requiring inventory of all JCA/JCE algorithm usage across Java services.
- Organizations migrating from legacy Java crypto (DES, 3DES) to modern algorithms.
Detected patterns
| Framework | What’s Scanned |
|---|---|
| JCA/JCE | Cipher.getInstance("AES/GCM/NoPadding"), KeyGenerator.getInstance("AES"), MessageDigest.getInstance("SHA-256") |
KeyPairGenerator | RSA, EC, DSA key generation with key size parameters |
SSLContext | TLS protocol versions, enabled cipher suites, trust manager configuration |
| Bouncy Castle | Low-level crypto operations, algorithm selection, provider registration |
| Google Tink | Key template selection, AEAD, MAC, signature configurations |
KeyStore | JKS/PKCS#12 operations, certificate loading, key entry management |
Signature | Signing algorithm selection (SHA256withRSA, SHA384withECDSA, etc.) |
SecureRandom | Random number generator algorithm and provider selection |
High-level integration flow
- QCecuring scans Java repositories via Git integration or local filesystem access.
- AST-based analysis identifies JCA/JCE API calls, algorithm strings, and crypto configurations.
- Build files (Maven, Gradle) are parsed for crypto library dependencies and versions.
- Discovered crypto usage is normalized into CycloneDX CBOM format with full algorithm details.
- Results feed into the centralized CBOM inventory with PQC readiness scoring per finding.
Need help integrating QCecuring with Java Cryptographic Scanning?
Ready to Secure Your Enterprise?
Experience how our cryptographic solutions simplify, centralize, and automate identity management for your entire organization.