Tools & TutorialsMEDIUM

Java 26 - New Cryptography API and HTTP/3 Support Released

HNHelp Net Security
🎯

Basically, Java 26 has new tools for better security and faster internet connections.

Quick Summary

Oracle has launched JDK 26, introducing a new cryptography API and HTTP/3 support. These updates enhance security and network performance for Java applications. Developers should explore these features to optimize their projects and ensure compliance with modern standards.

What Happened

Oracle has officially released JDK 26, marking the 17th feature release since adopting a six-month cadence in 2018. This version includes ten JDK Enhancement Proposals (JEPs) that introduce significant improvements across various areas, including language features, garbage collection, cryptographic tools, and network protocol support. Notably, the release emphasizes enhancing Java's cryptographic capabilities and introducing support for the new HTTP/3 protocol.

Among the standout features is the PEM encoding API, introduced in JEP 524. This new tool allows developers to convert cryptographic objects like keys and certificates into the Privacy-Enhanced Mail format, facilitating better interoperability with existing systems that utilize PEM for key exchanges. This enhancement aims to minimize manual encoding errors, which can lead to vulnerabilities in secure communications.

Who's Affected

This release impacts a wide range of Java developers and organizations that rely on Java for building secure applications. With the addition of the PEM encoding API, developers can now integrate cryptographic functionalities more seamlessly into their projects. Furthermore, the inclusion of HTTP/3 support means that applications can now leverage faster and more efficient network communications, particularly beneficial for microservices and API-driven environments.

The improvements in garbage collection and language features also provide benefits to developers looking to optimize their applications for performance and reliability. As Java continues to evolve, these updates ensure that developers have access to the latest tools and standards necessary for modern software development.

What Data Was Exposed

While JDK 26 does not directly expose any sensitive data, the introduction of the new cryptographic API enhances the security of data handled by Java applications. By improving the way cryptographic objects are managed and encoded, the risk of data exposure due to misconfiguration or encoding errors is significantly reduced. Additionally, the support for HTTP/3 allows for more secure and efficient data transmission over the network, further protecting sensitive information.

What You Should Do

For developers, it is crucial to familiarize themselves with the new features introduced in JDK 26. Here are some recommended actions:

  • Explore the PEM encoding API: Understand how to implement this API in your projects to enhance cryptographic operations.
  • Test HTTP/3 support: If your applications rely on network communications, consider testing the new HTTP/3 capabilities to improve performance.
  • Update your Java environment: Ensure that your development and production environments are updated to JDK 26 to take advantage of the latest security and performance improvements.
  • Monitor for future updates: Keep an eye on upcoming releases, as Oracle is expected to provide ongoing updates and enhancements to the JDK.

🔒 Pro insight: Analysis pending for this article.

Original article from

Help Net Security · Anamarija Pogorelec

Read Full Article

Related Pings

MEDIUMTools & Tutorials

Betterleaks - New Open-Source Secrets Scanner Released

Zach Rice has launched Betterleaks, an open-source tool for scanning git repositories for leaked credentials. This new tool enhances security with advanced filtering techniques. Developers can easily integrate it into their workflows to protect sensitive information.

Help Net Security·
LOWTools & Tutorials

ISC Stormcast - Insights for March 19, 2026

The ISC Stormcast for March 19, 2026, shares vital cybersecurity insights. Tune in to stay updated on trends and tools that matter. Knowledge is power in the fight against cyber threats.

SANS ISC Full Text·
MEDIUMTools & Tutorials

VIPRE - Launches Microsoft Defender Integration for Phishing

VIPRE has launched an integration with Microsoft Defender to enhance phishing protection. This new feature simplifies threat management for security teams. By consolidating alerts, it helps prevent sophisticated phishing attacks that often evade traditional filters.

SC Media·
LOWTools & Tutorials

Clear Communication - Key to Cybersecurity Success

Clear communication is crucial for cybersecurity success. It fosters trust and collaboration among diverse teams, leading to better security outcomes. Discover how to improve teamwork in security.

Dark Reading·
MEDIUMTools & Tutorials

Tools for SOC - Accelerate Tier 1 Triage Efficiency

Slow triage in SOCs is a major bottleneck. Tier 1 teams struggle to validate alerts quickly, leading to wasted resources and delayed responses. Improving this process is crucial for effective incident management and risk reduction.

Cyber Security News·
MEDIUMTools & Tutorials

Veracode Fix - Automating Open-Source Vulnerability Remediation

Veracode has launched an AI tool to automate the fixing of open-source vulnerabilities. This solution helps developers streamline their workflows while enhancing security. With 30% of attacks stemming from supply chain issues, this innovation is crucial for safe software development.

Help Net Security·