SlideShare a Scribd company logo
Visit https://ebookultra.com to download the full version and
explore more ebooks or textbooks
Java Cryptography Extensions Practical Guide for
Programmers The Practical Guides 1st Edition Jason
Weiss
_____ Click the link below to download _____
https://ebookultra.com/download/java-cryptography-
extensions-practical-guide-for-programmers-the-practical-
guides-1st-edition-jason-weiss/
Explore and download more ebooks or textbooks at ebookultra.com
Here are some recommended products that we believe you will be
interested in. You can click the link to download.
JDBC Practical Guide for Java Programmers 1st Edition
Gregory D. Speegle
https://ebookultra.com/download/jdbc-practical-guide-for-java-
programmers-1st-edition-gregory-d-speegle/
Multicast Sockets Practical Guide for Programmers 1st
Edition David Makofske
https://ebookultra.com/download/multicast-sockets-practical-guide-for-
programmers-1st-edition-david-makofske/
Steve Lacy Conversations 1st Edition Jason Weiss
https://ebookultra.com/download/steve-lacy-conversations-1st-edition-
jason-weiss/
Practical Database Programming with Java 1st Edition Ying
Bai
https://ebookultra.com/download/practical-database-programming-with-
java-1st-edition-ying-bai/
Bayley III Clinical Use and Interpretation Practical
Resources for the Mental Health Professional 1st Edition
Lawrence G. Weiss
https://ebookultra.com/download/bayley-iii-clinical-use-and-
interpretation-practical-resources-for-the-mental-health-
professional-1st-edition-lawrence-g-weiss/
A Practical Guide to Teaching ICT in the Secondary School
Routledge Teaching Guides 1st Edition Stev Kennewell
https://ebookultra.com/download/a-practical-guide-to-teaching-ict-in-
the-secondary-school-routledge-teaching-guides-1st-edition-stev-
kennewell/
Test Driven Practical TDD and Acceptance TDD for Java
Developers 1st Edition Lasse Koskela
https://ebookultra.com/download/test-driven-practical-tdd-and-
acceptance-tdd-for-java-developers-1st-edition-lasse-koskela/
Cybersecurity for Executives A Practical Guide 1st Edition
Touhill
https://ebookultra.com/download/cybersecurity-for-executives-a-
practical-guide-1st-edition-touhill/
A Practical Field Guide for AS9100C Erik Valdemar Myhrberg
https://ebookultra.com/download/a-practical-field-guide-for-
as9100c-erik-valdemar-myhrberg/
Java Cryptography Extensions Practical Guide for Programmers The Practical Guides 1st Edition Jason Weiss
Java Cryptography Extensions Practical Guide for
Programmers The Practical Guides 1st Edition Jason
Weiss Digital Instant Download
Author(s): Jason Weiss
ISBN(s): 9780127427515, 0127427511
Edition: 1
File Details: PDF, 7.12 MB
Year: 2004
Language: english
Java Cryptography Extensions Practical Guide for Programmers The Practical Guides 1st Edition Jason Weiss
Java Cryptography Extensions
The Morgan Kaufmann Practical Guides Series
Series Editor: Michael J. Donahoo
Java Cryptography Extensions: Practical Guide for Programmers
Jason Weiss
JSP: Practical Guide for Java Programmers
Robert J. Brunner
JSTL: Practical Guide for JSP Programmers
Sue Spielman
Java: Practical Guide for Programmers
Zbigniew M. Sikora
The Struts Framework: Practical Guide for Java Programmers
Sue Spielman
Multicast Sockets: Practical Guide for Programmers
David Makofske and Kevin Almeroth
TCP/IP Sockets in Java: Practical Guide for Programmers
Kenneth L. Calvert and Michael J. Donahoo
TCP/IP Sockets in C: Practical Guide for Programmers
Michael J. Donahoo and Kenneth L. Calvert
JDBC: Practical Guide for Java Programmers
Gregory D. Speegle
For further information on these books and for a list of forthcoming titles,
please visit our website at http://www.mkp.com/practical
Java Cryptography Extensions
Practical Guide for Programmers
Jason weiss
AMSTERDAM 9BOSTON 9HEIDELBERG 9LONDON
NEW YORK" OXFORD" PARIS" SAN DIEGO
SAN FRANCISCO" SINGAPORE" SYDNEY" TOKYO
ELSEVIER Morgan Kaufmann is an imprint of Elsevier
M [4 ~
MORGAN KAUFMANN PUBLISHERS
Senior Editor
Publishing Services Manager
Project Manager
Associate Editor
Cover Design
Cover Image
Composition
Technical Illustration
Copyeditor
Proofreader
Indexer
Interior printer
Cover printer
Rick Adams
Andre Cuello
Anne B. McGee
Karyn Johnson
Yvo Reizebos Design
Image #939879: 9 BananaStock/BananaStock, Ltd./
PictureQuest
CEPHA Imaging Pvt. Ltd.
Dartmouth Publishing, Inc.
Graphic World Publishing Services
Graphic World Publishing Services
Graphic World Publishing Services
The Maple-Vail Book Manufacturing Group
Phoenix Color Corp.
Morgan Kaufmann Publishers is an imprint of Elsevier.
500 Sansome Street, Suite 400, San Francisco, CA 94111
This book is printed on acid-free paper.
9 2004 by Elsevier Inc. All rights reserved.
Designations used by companies to distinguish their products are often claimed as trademarks or
registered trademarks. In all instances in which Morgan Kaufmann Publishers is aware of a claim, the
product names appear in initial capital or all capital letters. Readers, however, should contact the
appropriate companies for more complete information regarding trademarks and registration.
No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any
form or by any meansgelectronic, mechanical, photocopying, scanning, or otherwisegwithout prior
written permission of the publisher.
Permissions may be sought directly from Elsevier's Science & Technology Rights Department in
Oxford, UK: phone: (+44) 1865 843830, fax: (+44) 1865 853333, e-mail: permissions@elsevier.com.uk.
You may also complete your request on-line via the Elsevier homepage (http://elsevier.com) by
selecting "Customer Support" and then "Obtaining Permissions."
Library of Congress Cataloging-in-Publication Data
Weiss, Jason.
Java cryptography extensions : practical guide for programmers / Jason Weiss.
p. cm.
Includes bibliographical references and index.
ISBN 0-12-742751-1
1. Java (Computer program language) 2. Cryptography. I. Title.
QA76.73.J38W445 2004
005.8t2--dc22
2003070900
For information on all Morgan Kaufmann publications,
visit our Web site at www.mkp.com.
Printed in the United States of America
04 05 06 07 08 5 4 3 2 1
For my wife Meredith and our son Kyle,
whom I love more dearly than anything else
This Page Intentionally Left Blank
Contents
Preface ix
Understanding Java's Cryptographic Architecture 1
1.1 Java and Cryptography 3
1.2 Java Cryptography Architecture 4
1.3 Java Cryptography Extension (JCE) 7
1.4 Understanding the Service Provider Interface Architecture
1.5 Installing Providers 9
1.5.1 Static Provider Registration 10
1.5.2 Dynamic Provider Registration 11
JCA Helper Classes 13
1.6.1 The Security Class 13
1.6.2 The Provider Class 14
1.6.3
1.6
1.7
1.6.4
1.6.5
Working with Jurisdiction Policy Files
Code Example: Obtaining a List of Installed Providers,
Formal Names 15
Code Example: Listing a Provider's Supported
Algorithms 19
Code Example: Obtaining a List of Installed Algorithms 22
27
Working with Symmetric Ciphers 29
2.1 Random Number Generation 30
vii
viii Contents []
2.2
2.3
2.4
2.5
2.6
2.7
2.8
2.9
The SecureRandom Engine 31
2.2.1 Code Example: Generating Random Values 32
The KeyGenerator Engine 33
2.3.1 Algorithm Independent Initialization 34
2.3.2 Algorithm Specific Initialization 35
2.3.3 Obtaining the Symmetric Cipher Key via SecretKey
Class 35
Avoiding Opaque Keys 36
2.4.1 Code Example: Converting a Key into a Key Specification,
Option 1 36
2.4.2 Code Example: Converting a Key into a Key Specification,
Option 2 39
Categorizing Symmetric Ciphers 40
2.5.1 Key Management 41
2.5.2 Non-Repudiation 41
2.5.3 Data Integrity 42
Padding and Cipher Modes 42
2.6.1 Padding 43
2.6.2 Cipher Modes 44
The Cipher Engine 46
2.7.1 Initializing the Engine 48
2.7.2 Code Example: Block Cipher Encryption 49
2.7.3 Code Example: Secure Streaming Cipher Encryption 52
2.7.4 Code Example: Secure Streaming Cipher Decryption 55
Password Based Encryption 59
2.8.1 Code Example: Password Based Encryption with a Message
Digest and an Encryption Algorithm 60
Bringing Order to Chaos: Picking a Cipher 64
2.9.1 DES 64
2.9.2 DESede a.k.a. TripleDES 64
2.9.3 Advanced Encryption Standard (AES) 64
2.9.4 Blowfish 65
Working with Asymmetric Ciphers and Key Agreement
Protocols 67
3.1 The KeyPairGenerator Engine 69
3.1.1 Code Example: Algorithm Independent Key Pair
Generation 69
3.1.2 Comparing Symmetric and Asymmetric Keys 71
3.1.3 Persistinga Key: Key Encodings Defined 72
3.1.4 Code Example: Inspecting Key Encodings 72
9 Contents iX
3.2
3.3
3.4
3.5
3.1.5 Code Example: Loading an X.509 Encoded Public Key from
Disk 75
3.1.6 Code Example: Loading a PKCS#8 Encoded Private Key from
Disk 76
Revisiting the Cipher Engine 78
3.2.1 Code Example: Encrypting a File with a Public Key 78
3.2.2 Code Example: Decrypting a File with a Private Key 81
Comparing Keys for Equality 84
Looking to the Future: Elliptic Curve Cryptography 84
3.4.1 Asymmetric Cipher Wrap-up 85
The KeyAgreement Engine 85
3.5.1 Code Example: Key Exchange to Establish a Secure
Channel 86
4 Message Digests, Message Authentication Codes, and Digital
Signatures 101
4.1 Choosing a Message Digest Algorithm
4.1.1 An Overview of an MD5 102
4.1.2 An Overview of SHA-1 103
4.1.3 An Overview of RIPEMD 103
4.2
4.3
4.4
4.5
102
The MessageDigest Engine 103
4.2.1 Code Example: Generating a Message Digest
4.2.2 Message Digest Performance 106
4.2.3 Understanding Message Digest Shortcomings
The Mac Engine 107
4.3.1 Code Example: Generating a Hashed MAC Digest
4.3.2 Understanding MAC Shortcomings 110
Digital Signatures 111
The Signature Engine 113
4.5.1
4.5.2
103
107
108
Code Example: Generating a Digital Signature Using a
Private Key 113
Code Example: Verifying a Digital Signature Using a
Public Key 115
Managing Keys and Certificates 119
5.1 The Need for Key Management 119
5.2 Digital Certificates Defined 120
5.3 The KeyStore Engine 121
5.3.1 The keytool Utility 124
X Contents u
5.4
5.5
Bibliography
Index 155
5.3.2 Code Example: Storage of a Symmetric Cipher Key 127
5.3.3 Code Example: Retrieving a Symmetric Cipher Key 130
5.3.4 A Word on Key Store Password Management 132
The CertificateFactory Engine 132
5.4.1
5.4.2
5.4.3
5.4.4
5.4.5
5.4.6
Conclusion
Process for Requesting a Certificate Signed by a CA 136
Certificate Revocation List (CRL) 137
Code Example: Encryption with a Digital Certificate 139
Code Example: Decryption with a Private Key 142
RSA Encryption Limitations 145
Code Example: Combining RSA with a Secret Key 145
150
153
Preface
I've always exhibited a deep enthusiasm for computers and software development. In fact,
I wrote some of my first software applications before I finished the sixth grade. However, it
wasn't until I joined the U.S. Navy as a Cryptologic Technician that I became interested in
cryptography, or more specifically cryptanalysis. Most people oversimplify cryptography.
"Yeah, we're secure; we encrypt our data."
That Means Nothing.
How strong is the key? What is the key's effective bit size? Which cipher mode was
employed? How are you managing the key(s)? Did you use the right type of cipher for the
job at hand? Is the data padded? Are you merely storing the data in an encrypted state, or
are you broadcasting it across a network?
People also often are confused about where the boundaries of cryptography lie.
Generally, the field of cryptography includes encryption, one-way hashes, digital signa-
tures, and various digital-certificate-related technologies (becaue the certificates are built
around keys typically used in either digital signature or encryption operations). Authen-
tication is only associated with cryptography, for example, to the extent of the inherent
relationship that exists between a public and private key pair and that if the public key
can decipher that signature, then we've authenticated that the private key had to be used
in the encryption of that hash. Authorization is certainly well beyond the boundaries of
cryptography, so don't expect any discussion of Access Control Lists (ACL) or group man-
agement here. If you are looking for this type of material, you should look into the Java
Authentication and Authorization Specification (JAAS).
One of the early challenges I faced when I started designing and writing software
that employed cryptographic algorithms was making sense of it all. There seemed to be an
endless stream of terminology! What is the difference between Electronic Codebook Mode
xi
xii Preface 9
and Cipher Block Chaining? How do I know if l should choose a symmetric cipher over
an asymmetric cipher? And once I understood the differences between these and knew
to choose a symmetric cipher, I was still faced with the daunting task of picking which
symmetric cipher to use, that is, which physical implementation of a symmetric cipher.
Identifying that you need some form of cryptography in your application is elemen-
tary. Even an executive-type can make a statement like "boy, we better protect that data!"
Where to go from there is the major challenge.
Target Audience
This book is intended for software engineers who are experienced in Java but have lit-
tle to no experience with cryptography. I assume that if you're holding this book you
have an advanced understanding of terms like authentication, digital certificate, public
key, encryption, and so on. We will review more advanced topics, such as cipher modes,
padding structures, and so on, where applicable.
Cryptography is an "on-demand" programming exercise for most engineers. On
demand, it is coded once and tested, and then focus shifts to the business problem for
the next n months of the project. As a result, it's very easy for even the most experienced
Java engineer to become rusty on cryptographic concepts, because they aren't used on a
daily basis. This book will address this problem head on, keeping definitions and code
examples at your fingertips for times when they are needed.
This book was planned and written to solve two distinct problems that software
engineers face after they reach the conclusion that they need to employ some form of
a cryptographic architecture in their design. First, cryptography is a world unto itself, in
which most texts present complex mathematical calculations ad nauseum. As professional
software engineers, we face increasingly tighter deadlines and simply don't have the time
to fully understand the underlying mathematical theorems at work behind an algorithm.
While the underlying math is very important, we'll leave that work to the researchers at
universities around the world. I openly admit that there are many researchers who possess
mathematical skills exponentially greater than mine, and they can explain to you why the
algorithm I'm using--which passed public scrutiny at their level--is considered crypto-
graphically secure. Thus, I've worked very hard to gloss over mathematical concepts, and
included references where applicable to sources that can provide insight into the math-
ematics if you're so inclined. However, we still have a responsibility to become fluent in
the terminology of the cryptographic universe if we are going to make informed design
decisions. This text will help you achieve the minimum fluency requirement for the lan-
guage of cryptography by discussing the various cryptographic engines that are exposed
via the Java Cryptology Architecture (JCA) and the Java Cryptography Extensions (JCE).
Once you employ your cryptographic fluency and determine that your design requires
a block cipher using a 128-bit key PKCS#5 padding and a CBC cipher mode, you sud-
denly realize that scope and magnitude of your second problem; how do I write that in
Java quickly? This is the second distinct problem this book intends to help you solve.
9 Preface xiii
To accomplish this, a substantial amount of time was spent to provide real-world code
samples in discrete pieces that you can choose from a la carte. Ideally you'll just copy and
paste the code I've written into your code and expand it/customize it from there.
Code Examples
Sun's JDK 1.4.1 release was used to author all of the code examples you hold here. The
development was done primarily on an Apple PowerMac G4, and testing was done on a
Windows XP box as well. Approximately 75% of these samples work with an unextended
version of the JCA/JCE, but other more complex algorithms like RSA encryption require the
download and installation of a 3rd-party JCE provider. To download the code examples in
.zip format, access http://www.mkp.com and find this book's page by searching in the
online catalogue.
There is a close relationship between the code example's JavaDocs and the book.
Each code sample explicitly points back to the section in the book, making it easy to
locate the corresponding text that explains the sample. For clarity, code examples in the
early chapters have been entirely self-contained, including coding techniques not directly
related to the material being discussed, like Java I/O operations. Later in the book a single
utility class is incorporated into the code examples. The reason for this utility class is
twofold: to shrink the size of the code examples and to allow you to focus on the material
at hand (not Java I/O). The following is a partial listing of the helper methods present in
this class, and the names give an indication of their relationship to Java I/O operations:
9 loadPublicKey()
9 readCipherTextFile()
9 readFromSocketChannel()
9 readPlainTextFile()
9 byte2Hex()
9 toByteArray()
9 toHexString()
9 writeCipherTextFile()
You may choose to include this utility class in your application, or copy/paste pertinent
methods from it into an existing utility class your application may already define.
Each code sample expands each exception that might be thrown into its own code
block. This was done intentionally, for two reasons. First, when you paste the code you
won't have to hunt around the JavaDocs to locate all of the exceptions you need to catch
for the code you're using. And perhaps more importantly, to encourage you to take that
extra three minutes to use Java's robust exception-handling architecture properly instead
of just catching everything using a lonely catch (Exception e) code block.
xiv Preface "
To make it easier for you to reuse the code samples in your application, when applica-
ble, code examples either declare or have commented out dynamic registration of both the
Legion of the Bouncy Castle JCE Provider and the Cryptix JCE Provider. This provides both
the code fragment to register the provider so you don't have to look it up, and more impor-
tantly, a visual cue that the algorithm you need to use is probably not natively supported
by Sun's JDK 1.4.1 and will require an extra .jar file when you deploy.
Whenever a 3rd-party JCE provider was required, the code arbitrarily chose to
dynamically register the providers in positions 5 and 6, respectively. The code sam-
ples can be built using Apache Ant. For documentation on how to use Apache Ant, see
http://ant.apache.org. Whenever the samples need to perform file access, they refer to
the root directory. Depending upon your permissions (especially if you are using a *nix
system) you may need to adjust these paths to be rooted in your home directory.
Throughout the text I refer to the Java SDK as $JAVA_HOME. Since this is a developer-
oriented book, it is assumed that you have the complete SDK installed and not simply a Java
Runtime Environment (JRE). When moving to a production environment where the SDK may
not be available, be sure to substitute $JAVA_HOME/jre/lib/ext with $JRE_HOME/lib/ext
where applicable. For consistency, throughout the text we use $JAVA_HOME notation.
Code examples use a smaller 9 point Courier font like this throughout the text.
In the longer code examples (specifically the KeyAgreement examples) key blocks have
been identified with a 15% gray shade and individual labels. The labels are referred to
specifically in the body of the text.
Acknowledgments
It is impossible for an individual to author a book like this without some help. In particular
I would like to thank my acquiring editor Karyn Johnson and my technical editor Jeff
Donahoo for their invaluable feedback and guidance throughout the entire process. Special
thanks go out to Reed Shilts for reviewing and verifying the code samples provided with the
book for completeness, accuracy, and cross-platform "gotchas" that I failed to catch when
I initially wrote them. I'd also like to thank all of the following reviewers who provided
great feedback on the draft chapters: Michael Parks, Uwe Guenther, Anthony Nadalin, and
Jon Eaves. Their input helped to shape the book you hold in your hands today.
Organization of this Book
Chapter 1 focuses on introducing the Java Cryptography Architecture and the Java Cryp-
tography Extensions. Additionally, it demonstrates the usefulness of the Security and
Provider classes.
Chapter 2 centers on symmetric cryptography operations, including the generation
of cryptographically secure pseudo-random number generators (CSPRNG), generation of
secret keys, and working with the Cipher engine.
9 Preface XV
Chapter 3 builds on our knowledge of how the Cipher engine works, introducing
asymmetric ciphers. A discussion of key agreements between 2 or more parties is also
included in this chapter.
Chapter 4 introduces the message digests, message authentication codes and digital
signatures. The theme of this chapter is how to ensure the content of a document didn't
change.
Chapter 5 details the uses of a key store for tracking secret keys, key pairs and digital
certificates. It also demonstrates how digital certificates can be used for encryption.
Finally
For those of you who like really hard puzzles, here are cryptographic puzzles that
pay you cash prizes for winning:
http://www.rsasecurity.com/rsaiabs/challenges
These contests directly attest to the differences in strengths between symmetric and asym-
metric algorithms and the inability to effectively compare one to the other. If this book
exposes an excitement about cryptology you never knew was in you, I encourage you
to nurture your curiosity. For learning the history of codes and ciphers, one of the best
books I've found on this topic is by Fred B. Wrixon, titled Codes and Ciphers & Other Cryp-
tic & Clandestine Communication, published by Black Dog & Leventhal Publishers, ISBN
1-57912-040-7.
This Page Intentionally Left Blank
Cryptography has its roots in very complex (and often theoretical) mathematics.
As a result, computers and cryptography complement each other well. Today's advanced
cryptographic operations involve mind-boggling amounts of mathematical calculations,
and computers perform these calculations exponentially faster than a human can perform
them by hand. The Java language includes a well-defined architecture that allows you to
include cryptographic services in your designs without fully comprehending the mathe-
matical proofs or calculations behind the algorithms. However, this does not mean that
it is not important to understand the algorithms (i.e., the cryptographic tools) at your
disposal. As an analogy, a screwdriver is a wonderful tool for driving a wood screw into
a piece of wood; however, that same screwdriver would not be effective if the object being
driven was a finishing nail.
Performing cryptographic operations with Java does not involve hundreds of lines
of code or require a Ph.D. in mathematics from MIT. Perhaps the most visible aspect of
cryptography is encryption, which can be accomplished in Java using as little as seven
lines of code, not counting proper exception handling. Here is a brief example demon-
strating a simple encryption operation. Don't worry about comprehending every aspect of
the program just yet--we have the whole book to explore Java's cryptographic capabilities!
NOTE: Please review the preface for code style information and download instructions.
Example I. I Sample Code Location: com.mkp.jce.chapl.SmallExample
try
Chapter 1" Understanding Java's Cryptographic Architecture 9
//Lookup a key generator for the DES cipher
KeyGenerator kg = KeyGenerator.getlnstance("DES");
//Generate a secret key that can be used by the DES cipher
SecretKey key = kg. generateKey() ;
SecretKeySpec keySpec = new SecretKeySpec(key.getEncoded(), "DES") ;
//Lookup an instance of a DES cipher
Cipher cipher = Cipher.getlnstance("DES") ;
//Initialize the cipher using the secret key
cipher, init (Cipher.ENCRYPT_MODE, keySpec) ;
//Encrypt our message
String plainText = "This is a secret message";
byte[ ] cipherText = cipher.doFinal(plainText.getBytes()) ;
System.out.println("Resulting Cipher Text:n");
for(int i=0;i<cipherText.length;i++)
{
System.out.print(cipherText[i] + ....);
}
System.out.println( ....
);
} catch (Exception e)
{
e.printStackTrace () ;
}
This example demonstrates some of the core tenets of cryptography with Java in action.
It shows the creation of a secret key that is used to translate an unencrypted message into
9 1.1 Java and Cryptography
Figure 1.1: Java's cryptographic libraries.
an encrypted one. The output of this sample will differ each time it is run because the key
is essentially random; when I ran it the output looked like this:
Resulting Cipher Text:
106 93 20 33 -86 -ii0 109 87 57 31 95 5 -67 36 -39 -7 117 -50 119 -26 -51 -40
118 105 68 5 -29 -47-90 -89 -70 84
The example also demonstrates the use of engine classes,classes that are not instantiated
directly. Alas, we do not want to get ahead of ourselves, so we will rewind and start by
defining Java's cryptographic infrastructure.
1.1 Java and Cryptography
From its humble birth through its present day incarnation, the Java language continues
to offer developers a computing platform that swells with cryptographic functionality.
Because of U.S. export laws at the time, the functionality is split between two different
libraries, the JAVA Cryptography Architecture (JCA) and the Java Cryptography Extensions
(JCE). Figure 1.1 shows the relationship between these two cryptographic libraries, display-
ing some of the capabilities covered throughout this book. The first library, JCA, is tightly
integrated with the core Java APIs. The second library, JCE, builds off of the concepts and
capabilities found in the JCA. The JCE houses many of the advanced cryptographic opera-
tions that were previously under U.S. export control. However, the political landscape has
changed, and as of JDK 1.4, the JCA and JCE are present "out of the box" without requiring
a separate download of the JCE. JCE 1.2.2 remains available as a separate download for
JDK 1.2 and 1.3 installations, and it supports the same suite of engines found in JDK 1.4.
Cryptography is often associated with the sole process of encryption/decryption;
however, the true scope of the field is actually much larger than this, encompassing a wide
array of operations to include:
9 Message digests or hashing
9 Message authentication codes
9 Digital signatures
Other documents randomly have
different content
nips off d' guard as I says when he slugs him wit 'd' billy. Joe lets
himself into d' cage wit' that.
“Now, d' key to d' outside door ain't in d' coop at all. There's an
old stiff of a dep'ty sheriff planted outside wit' that. As Joe opens d'
inside door, he raps on d' bars of d' cage wit' his key, an' it's d' tip for
this outside snoozer to unlock his door. Of course he plays Joe for d'
guard coinin' out from his rounds.
“It's at this door-slammin' pinch where Joe's luck comes in, an'
relieves him of d' chanct of d' gang of dep'ties in d' office tumblin' to
him. Just as Joe raps to d' sucker on d' outside door, an' then lets
himself into d' cage, a gun goes off inside d' jail. It's Joe's guard. Joe
forgets to pinch d' pop, see! an' this gezebo gets his hooks onto it,
all tied like he is, an' bangs away wit' it in his pockets so as to warn
d' gang Joe's loose.
“'That does me for fair!' t'inks Joe when he hears d' gun; ''dey
gets me dead to rights!'
“Say! it was d' one trick that saves him! At d' bang of d' gun every
dep'ty leaps to his trilbys an' comes chasin'. D' outside mark has just
unslewed his door. He flings it wide open an' scoots inside d' cage.
Joe t'rows d' inside door open—for Joe's dead swift to take a hunch
that way—an 'd' outside guard an 'd' entire bunch of dep'ties goes
sprintin' into d' jail. Then Joe locks 'em all in an' loafs t'rough d'
offices into d' street.
“Yes; Joe knows where he's goin'. He toins into d' foist stairway
an' climbs one story to a law office, which d' crooks outside has fixed
to be open, waitin' for him. Nixie; d' law guy ain't in on d' play. A dip
named Jim Butts comes an' touts this law sharp away, an' cons him
into goin' out six miles to d' country to draw d' last will an' test'ment
of a galoot he says is on d' croak, an' can't wait for mornin'. Yes,
Butts has one of his mob faked up for sick, an' dey detains d' law
guy four hours makin' d' will. This stall of Butts, who's doin' d' sick
act, sets up between gasps an' gives away more'n twenty million
dollars wort' of wealt'. This crook who's fakin' sick is on his uppers at
d' time, an' don't really have d' price of beer; but to hear him make
his will that night, you'd say he was d' richest ever; d' Astors was
monkeys to him.
“As I states, Joe skips into this lawyer's office, d' same bein' open
for d' poipose, an' one of d' 'fambly' holdin' it down. While Joe's in
there he hears d' chase runnin' up an' down in d' street below d'
window.
“Not for long, though. Fifteen minutes after Joe is outside d' jug,
one of d' crooks calls up d' Central Office be telephone.
“'Who's talkin'?' asts d' captain at d' Central Office.
“'It's Doyle, lieutenant o' police, Fourt' Precinct,' says d' crook
who's on d' wire. Me man on d' station house beat just reports Joe
Dubuque drivin' west on Detroit street wit' a horse an' buggy. He
was on d' dead run, lamin' loose to beat four of a kind. Send all d'
men youse can spare.'
“An' that's what d' captain at d' Central Office does. In ten minutes
every cop an' fly cop is on d' chase, a mile away from Joe, an' gettin'
furder every secont, see!
“After a while it settles down all quiet an' dead about d' jail, an 'd'
little old law office where Joe lies buried. He, an' d' crook who's
waitin' for him, is chinnin' each other in whispers. All d' time Joe's
got his lamps to d' window pipin' off d' other side of d' street. At last
a cab drives up opposite d' law office an' stops. A w'ite han'kerchief
shows flutterin' be d' window. It's Wild Willie who's inside.
“Joe's pal gets up an' goes down to d' street. All's clear an' he
w'istles up to Joe. When he gets d' office Joe sort of loafs down an'
saunters over to d' cab. D' door opens an' in one move Joe's inside,
an' d' nex' his arm is 'round his Moll. She's all right, this Wild Willie
is, an' Joe does d' correct t'ing to give her d' fervent squeeze.
“That's d' end. Joe Dubuque runs clear away, goes under cover,
an' d' sheriff never gets his hooks on him ag'in. As Joe drives be d'
jail he can still hear them captiffs singin' 'Rock of Ages.'
“'Say!' says Joe to Wild Willie as he toins her mug to his an'
smacks her onct for luck, 'I won't do a t'ing but make it a t'ousand
dollars in d' kecks of them ducks who's doin' that song. I'll woik d'
dough to 'em be some of d' boys, see!'”
B
BINKS AND MRS. B.
INKS was an excellent man, hard-working and sober. He made
good money and took it home to his wife for her judgment to
settle its fate; every dollar of it. Mrs. Binks was a woman
among a thousand. When taken separate and apart from his wife
and questioned, Binks said she was a “corker.” Binks declined all
attempts at definition, and beyond insisting that Mrs. Binks was and
would remain a “corker,” said nothing.
From what was told of Mrs. Binks by herself, it would seem that
she was a true, loving wife to Binks, and that, aside from the duty
every woman owed to her sex and the establishment of its rights in
all avenues of life, she held that with the wedding ring came a list of
duties due from a good woman to her husband, which could not be
avoided nor gone about.
“Some women,” quoth Mrs. B., “worry their husbands with a detail
of small matters. A woman who is to be a helpmeet to her husband,
such as I am to Binks, will be self-reliant and decide things for
herself. In the little cares of life which fall to her share, let her go
forward in her own strength. What is the use of adding her troubles
to his? If she has plans, let her execute them. If problems confront
her, let her solve them. If she tells her husband aught of the
thousand little enterprises of her daily home life, then let it be the
result. When success has come to her, she may call her husband to
witness the victory. Aside from that she should face her
responsibilities alone.”
Of course Mrs. B. did not mean by all this that she would not be
open and frank with Binks, and confide in him if a burglar were in
the house, or if the roof took fire in the night that she would not
arouse Binks and mention it. What she did mean was that when it
came to such things as dismissing the servant girl, the wife should
gird up her loins and “fire” the maiden singlehanded, and not ring
her husband in on a play, manifestly disagreeable, and likely to
subject him to great remorse.
It chanced recently that an opportunity opened like a gate for Mrs.
B. to illustrate her doctrine that wives should proceed in a plain duty
alone, without imposing needless anxiety on the head of the family.
Mrs. Binks had decided to visit her sister in Hoboken. She was to
go Thursday, and Binks, who was paid his sweat-bought stipend on
Monday, was to furnish the money Monday evening wherewith to
make the trip.
It chanced, unfortunately, that pay-day this particular week was
deferred. The head partner was sick, or out of town; checks could
not be drawn, or something like that.
“But your money will come on Saturday, boys,” said the other
partner.
Binks was obliged to wait.
The money was all right; it would be accurately on tap Saturday,
so Binks took no fret on that point.
But what was he to do about Mrs. B.? That good woman was to
go Thursday, and in order to organise for the descent upon her
relative would need the money—$40—on Tuesday. What was Binks
to do?
Clearly he must do something. He could not ask Mrs. B. to put off
her trip a week; indeed, his reluctance to take such course came
almost to the point of superstition.
In his troubles Binks suddenly bethought him of a gold watch,
once his father's, with a rich chain and guard attached. These
precious heirlooms had been given to Binks by the elder Binks'
executor, and were cherished accordingly.
Rather than disappoint Mrs. B. the worthy Binks decided, that just
for once in his life he would seek a pawnbroker and do business with
that common relative of all.
Binks felt timid and ashamed, but the case was urgent. There was
no risk, for his money would float in all right on the tides of
Saturday. Binks would then redeem these pledges from disgraceful
hock; all would be well. Mrs. B. would be in Hoboken on redemption
day, and it would not be necessary to tell her anything about the
matter. It would save her pain, and Binks bravely determined to
keep the whole transaction dark.
Again, if he told her he had not been paid at the store, the brave
woman would indubitably wend to his employer's house and demand
the reason why. This would be useless and embarrassing. Therefore,
Binks would say nothing. He would pawn the ancestral super, and
get it again when his money came in, and his wife was away.
The watch and its appertainments were snug in the far corner of a
bureau drawer; away over and behind Mrs. B.'s lingerie. Binks had a
watch of his own, a Waterbury, with a mainspring as endless as a
chain pump. Mrs. B. saw, therefore, no reason why he should carry
the gold watch of his progenitor. Binks might lose it. Mrs. Binks
strongly advised that it be kept in the bureau where it would be safe
and naturally, in an affair of that sort Binks took his wife's advice.
Binks reflected that he must secure the watch and pawn it that
night. To do this he must plot to get Mrs. B. out of the house. Binks
thought deeply. At last he had it.
Binks sent a message home in the afternoon and asked Mrs. B. to
meet him in a store down town at six o'clock. Then he had himself
released at 5:30, and went hotfoot homeward.
The coast was clear; Mrs. B. was down town in deference to his
stratagem, no doubt believing that Binks meditated soda water, or
some other delicacy, as the cause of his sudden summons of the
afternoon. She little wotted that she was the victim of deceit. If she
had, there would have been woe.
Binks rushed at once to the bureau and secured the treasure. He
did not wait a moment, but plunged off to a store where the three
balls over the door bore testimony to the commerce within. Binks
would explain to Mrs. B. on his return, how he had missed her and
so failed to keep his date with her down town.
The merchant of loans and pledges looked over Binks' timepiece,
and then, as Binks requested, gave him a ticket for it and $40. It
was to be redeemed in thirty days or sooner. And Binks was to pay
$44 to get it again. Binks was very willing. Anything was wiser and
better than to permit Mrs. B.'s visit to her sister to be interrupted.
When Binks got home Mrs. B. had already returned.
There was a bad light in her eye. She accepted Binks' excuses and
explanations as to “how he missed her down town” with an evil
grace. She as good as told Binks that he deceived her; that if the
phenomenon were treed she would find another woman in the case.
However, Binks had the presence of mind to turn over the $40 he
reaped on the watch; and as he expressed it later:
“That sort of hushed her up.”
The next day Binks returned to his labours, while Mrs. B. repaired
to the marts to plunge moderately on what truck she stood in want
of for her trip.
When Mrs. B. got back to the house it chanced that the first thing
she needed was in the fatal drawer. She opened it.
Horrors! The watch was gone!
There was naught of hesitation; Mrs. B. knew it had been stolen.
Anybody could see that from the way every garment had been
carefully laid back to hide the loss.
What should she do? The police must at once be notified. Mrs. B.
pulled on her shaker and scooted for the police station. She told her
story out of breath. She left her house at three o'clock and was back
at four o'clock, and in that short hour her home had been entered
and looted of its treasures. Made to be specific, Mrs. B. said the
treasures were a watch and chain, and described them.
“What were they worth?” asked the sergeant of the detectives.
Mrs. B. considered a bit, and then said they would be dog cheap
at $1,000. She reflected that the sum, if published in the papers,
would be a source of pride.
The sergeant of detectives told Mrs. B. his men would look about
for her property, and should they hear of it or find it they would at
once notify her.
“You bet your gum boots! ma'am,” said the sleuth confidently,
“whatever crook's got your ticker, he's due to soak it or plant it
some'ers in a week. Mebby he'll turn it over to his Moll. But the
minute we springs it, ma'am, or turns it up, we'll be dead sure to put
you on in a jiff.”
“Thank you,” said Mrs. B.
Then Mrs. Binks went home and, true to her determination to save
Binks from unnecessary worry, she told him nothing of the loss nor
of her arrangements for the watch's recovery.
“What's the use of bothering Binks?” she asked herself. “All he
could do would be to notify the police, and I've done that.”
Thursday came and Mrs. B. set forth for Hoboken. No notice had
come from the police. Binks was glad to see her go. He had lived in
fear lest she come across the departure of the watch. He breathed
easier when she was gone. As for Mrs. B., as she had not heard from
the police, there was nothing to tell Binks; wherefore, like a self-
reliant woman who did not believe in making her husband unhappy
to no purpose, she left without word or sign as to her knowledge of
the watch's disappearance.
It was Friday; ever an unlucky day. Binks was walking swiftly
homeward. Binks was thinking some idle thing when a hand came
down on his shoulder, heavy as a ham.
“Hold on, me covey; I want you!”
Binks looked around, scared and startled. He had been halted by a
stocky, bluff man in citizen's clothes.
“What is it?” gasped Binks.
“Suttenly, sech a fly guy as you don't know!” said the bluff man,
with a glare. “Well! never mind why I wants you; I'm a detective,
and you comes with me.”
And Binks went with him.
Not only that, Binks went in a noisy patrol wagon which the
detective rang for; and it kept gonging its way along and attracting
everybody's attention.
The word went about among his friends that Binks was drunk and
had been fighting.
“And to think a man would act like that,” said one lady, who knew
Binks by sight, “just because his wife is away on a visit! If I were his
wife I'd never come back to him!”
At the station Binks was solemnly looked over by the chief.
“He's the duck!” said the chief at last. “Exactly old Goldberg's
description of the party who spouts the ticker. Where did you collar
him, Bill?”
“I sees him paddin' along on Broadway,” replied the bluff man,
“and I tumbles to the sucker like a hod of brick. I knowed he was a
sneak the first look I gives; and the second I says to meself, 'he's
wanted for a watch!' Then I nails him.”
“Do you know who he is?” asked the chief.
“My name,” said Binks, who was recovering from the awful daze
that had seized him, “my name is B——”
“Shet up!” roared the bluff man. “Don't give us any guff! It'll be
the worse for you!”
“I know the mark,” said an officer looking on.
“His name is 'Windy Joe, the Magsman.' His mug's in the gallery
all right enough; number 38, I think.”
“That's correct!” said the chief. “I knowed he was familiar to me,
and I never forgets a face. Frisk him, Bill, and lock him up!”
“But my name's Binks!” protested our hero. “I'm an innocent
man!”
“That's what they all says,” replied the chief. “Go through him, Bill,
and lock him up; I want to go to me grub.”
Binks was cast into a dungeon. Next door to him abode a lunatic,
who reviled him all night. On the blotter the ingenuity of the chief
detective inscribed: “Windy Joe, the Magsman, alias Binks.
Housebreaking in daytime.”
There is scant need of spinning out the agony. Binks got free of
the scrape some twelve hours later. But it was all very unfortunate.
He came near dismissal at the store, and the neighbours don't
understand it yet. They shake their heads and say:
“It's very strange if he's so innocent, why he was locked up. When
the police take a man, he's generally done something.”
“I'm not sorry a bit!” said Mrs. B., when she was brought back
from Hoboken on Saturday by a wire the police allowed Binks to
send her. “And when I saw him with the officers, I was as good a
mind to tell them to keep him as ever I had to eat. To think how he
deceived me about that watch, allowing me to break my heart with
thoughts of it being stolen! I guess the next time Binks sneaks off to
pawn his dead father's watch, he'll let me know.”
I
ARABELLA WELD
(By the Office Boy)
I
t was a chill Harlem evening. The Undertaker sat in his easy
chair smoking his pipe of clay. About him were ranged the tools
and trappings of his gruesome art. On trestles, over in the
corner's gliding shadows, lay the remains he had just been
monkeying with.
At last, as one who reviews his work, the Undertaker arose, and
scanned the wan map of the Departed.
“He makes a great front,” mused the Undertaker. “He looks out of
sight, and it ought to fetch her.”
Back to his chair roamed the Undertaker. As he seated himself he
touched a bell. The Poet of the establishment glided dreamily in. The
Undertaker, not only straightened the kinks out of corpses to the
Queen's taste, but he furnished epitaphs, and as well, verses for
those grief-bitten. These latter were to run in the papers with the
funeral notice.
“Have youse torn off that epitaph for his jiblets?” asked the
Undertaker, nodding towards Deceased.
“What was it you listed for?” asked the Poet.
“D' epitaph for William Henry Weld,” replied the Undertaker. The
Poet passed over the desired epitaph.
William Henry Weld.
(Aged 26 years.)
P
His race he win with pain and sin,
At Satan he did mock;
St. Peter said as he let him in:
“It's Willie, in a walk!”
“You're a wonder!” cried the Undertaker, when he had finished the
perusal, and he gave the Poet the glad hand. “Here's d' price. Go
and fill your tank.”
“That should win her,” reflected the Undertaker, when the poet
had wended his way; “that ought to leave her on both sides of d'
road. What I've done for Deceased, and that epitaph should knock
her silly. She shall be mine!”
II
UBLIC interest having been aroused in the corpse, it may be
well to tell how it became that way.
Deceased was William Henry Weld. Five days before the
opening of our story, William donned his skates and lined out on one
of his periodicals. For four days he debauched to beat four kings and
an ace.
And William had adventures. He paid a fine; he fell down a coal
hole; he invaded a laundry and administered the hot wallops to the
presiding Chinaman. On the fourth day he declared himself in on a
ball not far from Sixth Avenue.
“Ah, there!” quoth William, archly, to a beautiful being to whom he
had not been introduced. “Ah, there! Tricksey; I choose youse for d'
next waltz.”
“Nit; not on your life!” murmured the beautiful one.
As William Henry Weld was about to make fitting response, a
coarse, vulgar person approached.
“What for be youse jimmin' 'round me pick?” asked this person.
“That's d' stuff, Barney!” said the beautiful one. “Don't do a t'ing
to him!”
The next instant William Henry Weld was cast into outer darkness.
“It's all right, Old Man!” said the friend who rescued William Henry
Weld, “I'm goin' to take youse home. Your wife ain't on to me, an' I'll
fake it I'm a off'cer, see! I'll give her d' razzle dazzle of her existence,
an' square youse wit' her.”
“It's Willie!” said the friend to Arabella Weld, as he supported her
husband into the sitting-room. “It's Willie, an' he's feelin' O. K. but
weedy. Me name, madam, is Jackson—Jackson, of d' secret p'lice.
Willie puts himse'f in me hands as a sacred trust to bring him home.”
“Is he sick?” moaned Arabella Weld, as she began to let her hair
down, preparatory to a yell.
“Never touched him!” assured the friend. “Naw; Willie's off his
feed a bit. You sees, madam, Willie hired out to a hypnotist purely in
d' interest of science, an' he's been in a trance four days, see! That's
why he ain't home. Bein' in a trance, he couldn't send woid. Now all
he needs is a rest for, say, a week. Oughtn't to let him get out of his
crib for a week.”
At 4 o'clock the next morning William Henry Weld began to see
blue-winged goats. Arabella Weld “sprung” a glass of water on him.
“Give it a chase!” shrieked William Henry Weld, wildly waving the
false beverage aside.
In his ratty condition he didn't tumble to the pure element's
identity, but thought it was one of those Things.
At 5 o'clock A. M. William Henry Weld didn't do a thing but perish.
When the glorious sun again poured down its golden mellow beams,
the Undertaker had his hooks on him and Arabella Weld was a
widow.
III
B
UT to return to the Undertaker, the real hero of our tale. We
left him in his studio poring over the epitaph of William Henry
Weld, while Departed rehearsed his dumb and silent turn for
eternity in the corner's lurking shadow. At last the Undertaker roused
himself from his reveries.
“I must to bed!” he said; “it waxeth late, and tomorrow I propose
for her in wedlock.”
Next morning the Undertaker arose refreshed. He had smote his
ear for full eight hours. He felt fit to propose for his life, let alone the
delicate duke of Arabella Weld.
The Undertaker's adored one was to come at noon. She wanted to
size up Departed prior to the obsequies.
Although it was but 9 o'clock, the Undertaker had to get a curve
on himself to keep his date with Arabella Weld at midday. He had an
invalid to measure for a coffin—it was a riveted cinch the party
would die—and then there was a corpse to shave in the next block.
These duties were giving him the crowd.
But our hero made it; played every inning without an error, and
was organised for Arabella Weld when she arrived.
As they stood together—Arabella and the man who, all unknown
to her, loved her so madly—looking down at Deceased, she could not
repress her admiration.
“On d' dead! I never saw Willie look so well,” she said. “He's very
much improved. You must have taken a woild of pains wit' Willie.”
The Undertaker was silent.
Struck by this, Arabella Weld turned her full lustrous lamps on the
Undertaker and saw it all. It was for her, the loving heart beside her
had toiled over Deceased like an artist over a picture.
Swift is Love, and the Undertaker, quivering with his great passion,
twigged in an instant that Arabella was onto him. A vast joy swept
his heart like a torrent.
“I wanted him to make a hit for your sake,” he whispered, stealing
his arm about her.
O
Arabella softly put his arm away.
“Not now,” she sighed. “It would be too soon a play. We must wait
until we've got Willie off our hands—we must wait a year.”
“Wait a year!” and the pain of it bent the Undertaker like a willow.
“Wait a year, dearest! Now, what's d' fun of that? You must take me
for a farmer!” and his tones showed that the Undertaker was hurt.
“But in Herkimer County they wait a year,” faltered Arabella,
wistfully.
“Sure! in Herkimer!” consented the Undertaker; “but that's Up-the-
state. A week in Harlem is equal to a year in Herkimer. Let it be a
week, love!”
“This isn't a game for Willie's life insurance?” and great crystals of
pain and doubt swam in Arabella's glorious eyes.
“Oh, me love!” cried the Undertaker, fondly, yet desperately, “plant
d' policy wit' Willie! Send it back to d' company if youse doubts me,
an' tell 'em to call d' whole bluff a draw.”
The bit of paper, containing the epitaph, fluttered to the floor from
her nerveless mits, her beautiful head sank on the broad shoulder of
the Undertaker, and her tears flowed unrestrained.
IV
ne week had passed since William Henry Weld was solemnly
pigeon-holed for eternal reference.
The preacher received the couple in his study.
“Shall I marry you with the prayer-book, or would youse prefer the
short cut?” he asked.
“Marry us on a deck of cards, if you choose!” faltered Arabella. Her
eyes sought the floor, while the tell-tale blushes painted her lovely
prospectus. “Only cinch the play, an' do it quick!”
Java Cryptography Extensions Practical Guide for Programmers The Practical Guides 1st Edition Jason Weiss
N
THE WEDDING
(Annals of The Bend)
aw; I'm on I'm late all right, all right; but I couldn't help it,
see!”
Chucky was thirty minutes behind our hour. I'd been sitting
in the little bar in sickening controversy with one of the vile cigars of
the place waiting for Chucky. For which cause I was moved to
mention his dereliction sharply.
“Sorry to keep an old pal playin' sol'taire, wit' nothin' better to
amuse him than d' len'th of rope youse is puffin',” continued Chucky
in furtive excuse, “but I was to a weddin' an' couldn't breakaway.
That's w'y I've got on me dress soote.
“Say! on d' dead! of course I ain't in on many nuptials; but all d'
same I likes to go. I always comes away feelin' so wise an* flossy
an* cooney. Why, I don't know, unless it's 'cause d' guys gettin'
hitched looks so much like a couple of come-ons—so dead sure life
is such a cinch, such a sight of confidence like one sees at a weddin',
be d' parts of d' two suckers who's bein' starred, never omits to
make me feel too cunnin' to live for d' whole week after.
“Sure! this weddin' was a good t'ing; what youse might call d' real
t'ing; an' it's a spark to a rhinestone it toins out all hunk for d' folks
involved. Who's d' two gezebos who gets nex' to each other? D'
groom is d' boss gunner of one of our war boats, an 'd' skirt is d'
cash goil in d' anti-Chink laundry on Great Jones street.
“An' say! that little skirt's a wonder, an' don't youse forget it! She's
good any day for any old t'ing I've got; an' all she's got to do is just
rap, an' she takes it, see! It was me Rag sees d' goil foist one time
when she's down be d' laundry puttin' in me t'ree-sheets for their
weekly dose of suds.
“Is me Rag an' me married? Say! I likes that, I don't t'ink! Youse is
gettin' fanciful in your cupolo. 4 Be me little Bundle an' me married?'
says you. Well, I should kiss a pig! Youse can take me tip for it, if we
ain't man an' wife be d' longest system d' Cat'lic Choich could play—
for me Rag told d' father who 'fficiates that we're out for d' limit—
then all I got to stutter is there ain't a mug who's married in d' entire
city of Noo York.
“Cert! we're married!” Chucky went on after cheering himself with
the tankard which the barkeeper placed before him. “If youse had
let your lamps repose on this horseshoe scar over d' bridge of me
smeller, youse would have tumbled to d' fac wit'out astin'.
“How do I win it? I'm comin' up d' stairs like a sucker, just followin'
a difference of opinion between me an' me loidy (I soaked her a
little one, an' that's for fair! to show her she's off her trolley about d'
subject in dispoote), when she cuts loose d' coal bucket at me. Say!
she spoiled me map for a mont'.
“But to get back to d' little laundry goil. Me Rag, as I says, was in
this tub-joint where d' goil woikswit' me linen one day; an' just as
she chases in, a fresh stiff who's standin' there t'run some raw bluff
at d' little laundry goil she couldn't stand for, see! an' she puts up a
damp eye an' does d' weep act.
“This little laundry goil is one of them meek, harmless people—
rabbits is bull-terriers to 'em—an' so when me onliest own beholds d'
tears come chasin down her nose at d' remarks of this fly guy, she
chucks me shirts in d' corner an' mounts him in a hully secont.
“An' say! me Rag can scrap, an' that's no dream! I don't want
none of it. When she an' me has carried d' conversation to d' point
where she takes out her hairpins, an' gives her mane to d' breeze,
that's me cue to cork. Youse can't get another rise out of me after
that: I knows her.
“Well! me Rag lights into this hobo who's got gay wit 'd' little goil,
an' when she takes her hooks out of his make-up, an' he goes
surgin' into d' street, honest! he looks like he's been fightin' a dog.
Some lovers of true sport who's there an' payin' attention to d' mill,
says this galoot wasn't in it wit' me Rag. She has him on d' blink
from d' jump; she win in a loiter.
“Takin' her part that way makes d' little laundry goil confidenshul
wit' me Rag. It's about two weeks later when she sprints over an'
tells Missus Chuck (she makes her promise to lay dead about it, too,
but still she passes d' woid to me)—she tells me Rag, as I'm sayin',
that she's in trouble. Her steady, she says, is one of d' top notch
gunners of one of our big boats; he's d' main squeeze in histurrent,
see! an' way up in d' paint. His boat's been layin' at d' Navy Yard, an'
now he's ordered to sail for Cuba in a week an' help straighten up d'
Dagoes we're havin' d' recent run in wit'. Meanwhiles, she says, dey
won't let her beloved have shore leave; an' neither dey won't stand
for her to come aboard an' see him. There youse be! a case of dead
sep'ration between two lovin' hearts.
“D' little laundry goil gives it out cold, she'll croak if she don't get
to see her Billy before he skates off for d' wars. She says she knows
he's out to be killed anyhow. D' question wit' her is—what's she goin'
to do? Dey won't let her aboard d' boat, an' dey won't let him
aboard d' land; now, what's d' soon move for her to make?
“Well, me Rag—who's got a nut on her for cert—says for her to
skip down to Washin'ton an' go ag'inst d' Sec'tary himself.
“'Make him a strong talk,' says me Rag; 'give him a reg'lar razzle-
dazzle, an' he'll write youse a poiper to them blokes aboard d' boat
to let youse see your Billy.'
“'Do youse t'ink for sure he will?' says d' little laundry goil.
“'Why, it's a walkover!' says me Rag. 'If he toins out a hard game,
give him d' tearful eye, see! an' cough a sob or two, an' he'll
weaken! You can't miss it,' says me ownliest; 'it's easy money.'
“But d' little goil was awful leary of d' play.
“' Washin'ton is so far away,' she says.
“' It's like goin' to Harlem,' says me Rag. 'All youse has to do to
go, is to take some sandwidges an' apples to sort o' jolly d' trip, an'
then climb onto d' cars an' go. When d' Con. comes t'rough, pass
him your pasteboard, see! an' if any of them smooth marks try to
make a mash, t'run 'em down an' t'run 'em hard. I'll go over an' do
your stunt at d' laundry, so that needn't give youse a scare. An' be d'
way! if that lobster I win from d' other day shows up, I'll make a
monkey of him ag'in. I didn't spend enough time wit' him on d'
occasion of our mix-up, anyway.'
“At last d' little laundry goil makes d' brace of her life. She's so
bashful an' timid she can't live; but she's dead stuck on seein' her
Billy before he sails away, an' it gives her nerve. As I says, she takes
me Rag's steer an' skins out for d' Cap'tal.
“An' what do youse t'ink? D' old mut who's Sec'tary won't chin wit'
her. Toins her down cold, he does; gives her d' grand rinky-dink
wit'out so much as findin' out what's her racket at all.
“At d' finish, however, d' little goil lands one of d' push—he's a
cloik in d' office, I figgers—an' he hears her yarn between weeps, an'
ups an' makes a pass or two, an' she gets d' writin'. It says to toin
Billy loose every afternoon till d' boat pulls out.
“Say! him an 'd' little goil, when she gets back, was as happy as a
couple of kids; dey has more fun than a box of monkeys. On d' level!
I was proud of me Rag for floor managin' d' play. She wasn't solid
wit' Billy an 'd' little goil! Oh, no!
“That's how me an' me loidy was in on this weddin' to-day wit'
bot' trilbys. Me Rag's 'It' wit' d' little goil; youse can gamble on that!
“Of course d' war's over now, an' two weeks ago d' little goil's Billy
comes home. An' what wit' pay, an' what wit' prize money, he hits d'
Bend wit' a bundle of d' long green big enough to make youse t'row
a fit, an' he ain't done a t'ing but boin money ever since.
“Nit; it ain't much of a story, but d' whole racket pleases me out o'
sight, see! Considerin' d' hand me Rag plays, when I'm at that
weddin' to-day I feels like a daddy to Billy an 'd' little goil. On d'
level! I feels that chesty about it, that when d' priest is goin' to bat
an says, 'Is there any duck here to give d' bride away?' I cuts in on
d' game wit 'd' remark, 'I donates d' bride meself.' I s'pose I was
struck dopey, or nutty, or somethin'.
“But me Rag fetches me to all c'rrect. She clinches her mit an'
whispers:
“Let me catch youse makin' another funny break like that an' I'll
cop a sneak on your neck.' An' then she stands there chewin' d'
quiet rag an' pipin' me off wit' an eye of fire. 'Such an old bum as
youse,' she says, 'is a disgrace to d' Bend.'”
T
POINSETTE'S CAPTIVITY
his is a tale of last August. Poinsette was to be left alone for
four weeks. Mrs. Poinsette had settled on Cape May as a good
thing for the hot spell. She would hie her thither and leave
Poinsette to do his worst without her.
Poinsette did not care. He bravely told Mrs. P. she needed an
outing. The ozone and the salty, ocean breeze would do her good.
So he encouraged Cape May, and bid Mrs. P. go there by all means.
It was decided by the Poinsettes discussing Cape May to have
Poinsette room up town while Mrs. P. was thus Cape Maying. The
Poinsette house in the suburbs might better be locked up during
Mrs. P.'s absence from the city. It would be more economical;
indeed, it was not esteemed safe to leave the Poinsette lares and
penates to the unwatched ministrations of the Congo who performed
in the Poinsette kitchen. It would be wiser to dismiss the servant,
bolt and bar the house, obtain Poinsette apartments, and let him
browse for food among the bounteous restaurants of the city.
Poinsette found a room to suit in a house on West 87th Street. It
was one of a long row of houses. Poinsette reported his victory in
room-hunting to Mrs. P. Poinsette was now all right, and ready for
what might come. Mrs. P. might bend her course to Cape May
without further hesitation.
Mrs. P. was glad to learn of Poinsette's apartment success. She
went out and looked at his find to make sure that Poinsette would
be comfortable. Incidentally, Mrs. P. kept her eye about her, to note
whether the boarding-house books carried any pretty girls. Mrs. P.
did not care to have Poinsette too comfortable.
There were no pretty girls. Mrs. P. approved the selection. The
very next day she kissed Poinsette good-bye and rumbled and
ferried to the station, from which arena of smoke and noise a train
leaped forth like a greyhound and bore her away to Cape May.
Poinsette did not accompany his spouse to the station. Ten years
before he would have done this, but experience had taught him that
Mrs. P. could care for herself. Therefore he remained behind to
fasten up the house. Soberly he went about locking doors, and
fastening windows, and thinking rather sadly,—as all husbands so
deserted do,—of the long, lonely months before him. At last all was
secure, and Poinsette turned the key in the big front door and came
away.
Poinsette did not feel like work that afternoon, or the trifling
fragment of it that was left after Mrs. P. had wended and he had
locked up the house. He bought a few good books and several of the
more solid periodicals. They would serve during the weary nights
while Mrs. P. was away at the Cape. These Poinsette sent to his
rooms, and, as it was growing six o'clock now, he turned into
Sherry's for his dinner.
Just where Poinsette went that evening following Sherry's, and
what he saw and did, and who assisted at such enterprises as he
embarked in, would be nothing to the present point and may be
skipped. They are the private affairs of Poinsette, and not properly
the subjects of a morbid curiosity. However, lest Mrs. P. see this and
argue aught herefrom to feed distrust, it should be said that
Poinsette saw nobody, did nothing, went no place unbecoming an
officer and a gentleman.
It was four o'clock in the morning when Poinsette, the sole
passenger aboard a foaming night-liner, toiled through the Park and
bore away for his new abode. Poinsette stopped the faithful night-
liner two blocks from the door and went forward on foot. Poinsette
did not care to clatter ostentatiously to his rooms at four in the
morning the first day he inhabited them.
Poinsette found the house without trouble, and stepped lightly to
the door. He put the pass-key his landlady had bestowed upon him
in the lock, but it would not turn. The bolt would not yield to his
wooing. Do all he might, and work he never so wisely, there had
sprung up a misunderstanding between key and lock which would
not be reconciled. Poinsette could not get “action;” the sullen door
still barred him from his bed.
At last Poinsette gave up in despair. He might ring the bell and
arouse the house; but he hesitated. It was his first day; the hour
needed apology. Poinsette thought it would be better to walk gently
to a hotel and abide for the remainder of the night. He would solve
this incompatibility of key and lock the next afternoon.
Poinsette turned away and started softly for the street. As he did
so a policeman stepped from behind a tree and stopped him. The
policeman had been watching Poinsette for five minutes.
“Wot was you a-doin' at the door?” he asked.
Poinsette, in a low, hurried voice, explained. He didn't care to
awaken his landlady by a tumult of talk, and have that excellent
woman discover him in the hands of the law.
“If your key don't work,” said the policeman, “why don't you ring
the bell?”
Poinsette cleared up that mystery. The officer was not satisfied.
“To be free with you, my man,” he said, seizing Poinsette's collar,
“I think you're a burglar. If that's your boarding-house you're goin'
in. If it isn't, you're goin' to the station.”
Then the policeman, with one hand wound about in Poinsette's
neckwear, made trial of the key with the other hand. The effort was
futile. The lock was obdurate; the key was stranger to it. Then the
blue guardian of the city's slumbers stepped back a pace and took a
mighty pull at the door-bell. It was a yank which brought forth a
wealth of jingle and ring.
Poinsette was glad of it. He had grown desperate and wanted the
thing to end. Bad as it was, it would be better to face his landlady
than be locked up in a burglar's cell. Poinsette was resigned,
therefore, when a second-story window lifted and a night-capped
head was made to overhang the sill and blot its silhouette against
the star-lit sky.
“Be you the landlady?” asked the policeman.
“Yes, I am!” quoth the night-cap in a snappy, snarly way. “What do
you want?” This with added sourness.
“This party says his name is Poinsette and that he rooms here,”
replied the officer.
“No such thing!” retorted the night-cap. “No such man rooms
here. Don't even know the name!”
Then the window came down with a grievous bang. It was as if it
descended on Poinsette's heart.
“You're a crook!” said the policeman, “and now you come with
me.”
Poinsette essayed to explain that the night-cap was not his
landlady; that he had made a mistake in the house. The policeman
laughed in hoarse scorn at this.
“D'ye think I'm goin' all along the row, yankin' door-bells out by
the roots on such a stiff as you're givin' me?”
That was the reply of the policeman to Poinsette's pleadings to try
next door.
Poinsette was led sadly off, with the grip of the law on his collar.
At the station he was searched and booked and bolted in. On the
hard plank, which made the sole furnishings of his narrow cell,
Poinsette threw himself down; not to sleep, but to give himself to
bitter consideration of his fate.
As Poinsette sat there waiting for the sun to rise and friends to
come to his rescue, the station clock struck five. It rang dismally in
the cell of Poinsette.
At Cape May, clocks of correct habits were also telling the hour of
five. Mrs. P. was not yet asleep. The vigorous aroma of the ocean
swept the room. The half-morning was beautiful; Mrs. P., loosely
garbed, sat in an easy-chair at the window and enjoyed it.
“I wonder what Poinsette's been doing,” said Mrs. P. to herself;
and there was a colour of jealousy in the tone. Then Mrs. P. snorted
as in contempt. “I'll warrant he's been having a good time,” she
continued. “This idea that married men when their wives are away
for the summer have a dull time, never imposed on me.”
TIP FROM THE TOMB
T
CHAPTER I
. Jefferson Bender was a doctor; that is, he was not a real,
legal doctor as yet, but he was a hard student, and looked
hopefully toward a day when, in accordance with the statutes
in such cases made and provided, he would be cantered through the
examination chute, and entitled to write “M. D.” following his name,
with all that it implied.
Each morning T. Jefferson Bender arose with the lark, and, seizing
his dissecting knife, plunged into whatever subject was spread
before him. In the afternoon he attended lectures, bending a hungry
ear and watching with eager eye, while the lecturer, in illustration of
his remarks, tortured poor people, free of charge. At night, when the
day's carvings, and listenings, and lookings were over, T. Jefferson
Bender sat in his easy chair and peered down the long aisle of
coming time.
The world was bright to the glance of T. Jefferson Bender; the
future full of promise. In his musings he saw himself striding
towards surgical fame and riches over a pathway strewn with the
amputational harvest of his skill. He filled the hereafter with himself
routing disease; cutting down deadly maladies as a farmer might the
mullein-stalk; driving before him bacteria and bacilli in herds, droves,
schools and shoals. T. Jefferson Bender was a happy man, and his
forehead was already, in his imaginings, kissed by the rays of a
dawning professional prosperity.
T
CHAPTER II
. Jefferson Bender allowed himself but one relaxation. He was
from Lexington, and had a true Kentuckian's love for
horseflesh. Thus it was that he patronised the races, and was
often seen at Morris Park, where he prevailed from a seat in the
grand-stand. Here, casting off professional dignity as he might a
garment, T. Jefferson Bender whooped and howled and hurled his
hat on high, as race following race swept in.
At intervals T. Jefferson Bender was carried to such heights of
madness as “playing the horses.” And then it was he suffered those
vicissitudes which are chronicled colloquially under the phrase of
“getting it in the neck.”
I
CHAPTER III
t was the day of the great race. The Morris Park grand-stand
was reeling full. The quarter stretch was crowded with
Democrats and Republicans and Mugwumps, who, laying aside
political hatreds for a day, had come to see the races. The horses
were backing and plunging in the grasp of rubbers and stable
minions, while the gay jockeys, with their mites of saddles on their
left arms, were being weighed in.
Suddenly, a cry of terror rent the air. Otero, a headstrong beauty,
had leaped upon the neck of Paddy the Pig, a horse rubber, and
borne him to the earth. Paddy the Pig's neck was severely wrenched,
so the crowd said. As the accident occurred, the victim fainted.
“Is there a doctor present?” shouted one of the race judges,
appealing to the grand-stand.
T. Jefferson Bender arose from where he sat, walked over
seventeen men and women, and leaped upon the stretch.
“I am here,” observed T. Jefferson Bender, while his eye lighted
and his nostrils expanded with the ardour of a great resolve.
T. Jefferson Bender bent above Paddy the Pig and felt his pulse.
“He lives!” muttered T. Jefferson Bender.
Then he called for whiskey.
At the magical words, Paddy the Pig languidly opened his eyes,
while a flush dimly painted his cheek.
“Doc, you have saved my life!” said Paddy the Pig.
“I have,” said T. Jefferson Bender, willing to be impressive. “I have
saved your life.”
“Doc,” said Paddy the Pig in a weak, fluttering voice, “I am only a
horse rubber, but I will make you rich. Play Skylight to win, Doc;
Skylight! It's a tip from the tomb!”
“It's a tip from the tomb!” said T. Jefferson Bender reverently,
“what are the odds?”
“It's a 20-to-1 shot, Doc. Play it. You will thus be paid for what
you've done for me.”
T
CHAPTER IV
hat night T. Jefferson Bender stood in a pawnshop. The
flickering gaslight shone on mandolins, pistols, watches, and
clothing, which had suffered the ordeal of the spout. T.
Jefferson Bender was dusty and footsore. He had walked from Morris
Park, and was now about to pawn his watch for food.
Java Cryptography Extensions Practical Guide for Programmers The Practical Guides 1st Edition Jason Weiss
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
Let us accompany you on the journey of exploring knowledge and
personal growth!
ebookultra.com

More Related Content

PDF
Privacy Preservation in cloud Environment using AES Algorithm
PDF
Introduction to cryptography for software developers
PPT
Writing RPG Applications Using Cryptographic Services APIs
PDF
Java Security Overview
PPTX
Protecting Sensitive Data (and be PCI Compliant too!)
PPT
Java Crypto
PPT
Chapter 08
PPTX
Introduction to Cryptography.pptx
Privacy Preservation in cloud Environment using AES Algorithm
Introduction to cryptography for software developers
Writing RPG Applications Using Cryptographic Services APIs
Java Security Overview
Protecting Sensitive Data (and be PCI Compliant too!)
Java Crypto
Chapter 08
Introduction to Cryptography.pptx

Similar to Java Cryptography Extensions Practical Guide for Programmers The Practical Guides 1st Edition Jason Weiss (20)

PPTX
big data and Iot , its security part ,hoe yoy help this
PPTX
Enterprise Cloud Security - Concepts Mash-up
PPTX
Cryptography 101 for Java Developers - Devoxx 2019
PPTX
Cryptography 101 for Java Developers - JavaZone2019
PPTX
Crypto academy
PDF
Jdbc 6
PPTX
501 ch 10 cryptography
PPT
Network Security: Standards and Cryptography
PDF
computer-security-and-cryptography-a-simple-presentation
PPT
Security via Java
PPTX
501 ch 10 understanding cryptography and pki
PPT
The new rocket science stuff in microsoft pki
PPT
Ch11 Basic Cryptography
PPTX
Data Security Essentials - JavaOne 2013
PPTX
Lecture 02 - 05 Oct 21.pptx
PDF
Encryption Boot Camp at Øredev
PPT
Ch12 Cryptography it-slideshares.blogspot.com
PDF
Cryptography
PDF
JDK 1 4 Tutorial 1 (no book cover) Edition Gregory Travis
big data and Iot , its security part ,hoe yoy help this
Enterprise Cloud Security - Concepts Mash-up
Cryptography 101 for Java Developers - Devoxx 2019
Cryptography 101 for Java Developers - JavaZone2019
Crypto academy
Jdbc 6
501 ch 10 cryptography
Network Security: Standards and Cryptography
computer-security-and-cryptography-a-simple-presentation
Security via Java
501 ch 10 understanding cryptography and pki
The new rocket science stuff in microsoft pki
Ch11 Basic Cryptography
Data Security Essentials - JavaOne 2013
Lecture 02 - 05 Oct 21.pptx
Encryption Boot Camp at Øredev
Ch12 Cryptography it-slideshares.blogspot.com
Cryptography
JDK 1 4 Tutorial 1 (no book cover) Edition Gregory Travis
Ad

Recently uploaded (20)

PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
20th Century Theater, Methods, History.pptx
PPTX
Introduction to pro and eukaryotes and differences.pptx
PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
My India Quiz Book_20210205121199924.pdf
PDF
Trump Administration's workforce development strategy
PPTX
Computer Architecture Input Output Memory.pptx
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PPTX
TNA_Presentation-1-Final(SAVE)) (1).pptx
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PDF
Computing-Curriculum for Schools in Ghana
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
PDF
HVAC Specification 2024 according to central public works department
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
20th Century Theater, Methods, History.pptx
Introduction to pro and eukaryotes and differences.pptx
B.Sc. DS Unit 2 Software Engineering.pptx
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
My India Quiz Book_20210205121199924.pdf
Trump Administration's workforce development strategy
Computer Architecture Input Output Memory.pptx
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
FORM 1 BIOLOGY MIND MAPS and their schemes
TNA_Presentation-1-Final(SAVE)) (1).pptx
Share_Module_2_Power_conflict_and_negotiation.pptx
Computing-Curriculum for Schools in Ghana
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
HVAC Specification 2024 according to central public works department
Ad

Java Cryptography Extensions Practical Guide for Programmers The Practical Guides 1st Edition Jason Weiss

  • 1. Visit https://ebookultra.com to download the full version and explore more ebooks or textbooks Java Cryptography Extensions Practical Guide for Programmers The Practical Guides 1st Edition Jason Weiss _____ Click the link below to download _____ https://ebookultra.com/download/java-cryptography- extensions-practical-guide-for-programmers-the-practical- guides-1st-edition-jason-weiss/ Explore and download more ebooks or textbooks at ebookultra.com
  • 2. Here are some recommended products that we believe you will be interested in. You can click the link to download. JDBC Practical Guide for Java Programmers 1st Edition Gregory D. Speegle https://ebookultra.com/download/jdbc-practical-guide-for-java- programmers-1st-edition-gregory-d-speegle/ Multicast Sockets Practical Guide for Programmers 1st Edition David Makofske https://ebookultra.com/download/multicast-sockets-practical-guide-for- programmers-1st-edition-david-makofske/ Steve Lacy Conversations 1st Edition Jason Weiss https://ebookultra.com/download/steve-lacy-conversations-1st-edition- jason-weiss/ Practical Database Programming with Java 1st Edition Ying Bai https://ebookultra.com/download/practical-database-programming-with- java-1st-edition-ying-bai/
  • 3. Bayley III Clinical Use and Interpretation Practical Resources for the Mental Health Professional 1st Edition Lawrence G. Weiss https://ebookultra.com/download/bayley-iii-clinical-use-and- interpretation-practical-resources-for-the-mental-health- professional-1st-edition-lawrence-g-weiss/ A Practical Guide to Teaching ICT in the Secondary School Routledge Teaching Guides 1st Edition Stev Kennewell https://ebookultra.com/download/a-practical-guide-to-teaching-ict-in- the-secondary-school-routledge-teaching-guides-1st-edition-stev- kennewell/ Test Driven Practical TDD and Acceptance TDD for Java Developers 1st Edition Lasse Koskela https://ebookultra.com/download/test-driven-practical-tdd-and- acceptance-tdd-for-java-developers-1st-edition-lasse-koskela/ Cybersecurity for Executives A Practical Guide 1st Edition Touhill https://ebookultra.com/download/cybersecurity-for-executives-a- practical-guide-1st-edition-touhill/ A Practical Field Guide for AS9100C Erik Valdemar Myhrberg https://ebookultra.com/download/a-practical-field-guide-for- as9100c-erik-valdemar-myhrberg/
  • 5. Java Cryptography Extensions Practical Guide for Programmers The Practical Guides 1st Edition Jason Weiss Digital Instant Download Author(s): Jason Weiss ISBN(s): 9780127427515, 0127427511 Edition: 1 File Details: PDF, 7.12 MB Year: 2004 Language: english
  • 8. The Morgan Kaufmann Practical Guides Series Series Editor: Michael J. Donahoo Java Cryptography Extensions: Practical Guide for Programmers Jason Weiss JSP: Practical Guide for Java Programmers Robert J. Brunner JSTL: Practical Guide for JSP Programmers Sue Spielman Java: Practical Guide for Programmers Zbigniew M. Sikora The Struts Framework: Practical Guide for Java Programmers Sue Spielman Multicast Sockets: Practical Guide for Programmers David Makofske and Kevin Almeroth TCP/IP Sockets in Java: Practical Guide for Programmers Kenneth L. Calvert and Michael J. Donahoo TCP/IP Sockets in C: Practical Guide for Programmers Michael J. Donahoo and Kenneth L. Calvert JDBC: Practical Guide for Java Programmers Gregory D. Speegle For further information on these books and for a list of forthcoming titles, please visit our website at http://www.mkp.com/practical
  • 9. Java Cryptography Extensions Practical Guide for Programmers Jason weiss AMSTERDAM 9BOSTON 9HEIDELBERG 9LONDON NEW YORK" OXFORD" PARIS" SAN DIEGO SAN FRANCISCO" SINGAPORE" SYDNEY" TOKYO ELSEVIER Morgan Kaufmann is an imprint of Elsevier M [4 ~ MORGAN KAUFMANN PUBLISHERS
  • 10. Senior Editor Publishing Services Manager Project Manager Associate Editor Cover Design Cover Image Composition Technical Illustration Copyeditor Proofreader Indexer Interior printer Cover printer Rick Adams Andre Cuello Anne B. McGee Karyn Johnson Yvo Reizebos Design Image #939879: 9 BananaStock/BananaStock, Ltd./ PictureQuest CEPHA Imaging Pvt. Ltd. Dartmouth Publishing, Inc. Graphic World Publishing Services Graphic World Publishing Services Graphic World Publishing Services The Maple-Vail Book Manufacturing Group Phoenix Color Corp. Morgan Kaufmann Publishers is an imprint of Elsevier. 500 Sansome Street, Suite 400, San Francisco, CA 94111 This book is printed on acid-free paper. 9 2004 by Elsevier Inc. All rights reserved. Designations used by companies to distinguish their products are often claimed as trademarks or registered trademarks. In all instances in which Morgan Kaufmann Publishers is aware of a claim, the product names appear in initial capital or all capital letters. Readers, however, should contact the appropriate companies for more complete information regarding trademarks and registration. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any meansgelectronic, mechanical, photocopying, scanning, or otherwisegwithout prior written permission of the publisher. Permissions may be sought directly from Elsevier's Science & Technology Rights Department in Oxford, UK: phone: (+44) 1865 843830, fax: (+44) 1865 853333, e-mail: permissions@elsevier.com.uk. You may also complete your request on-line via the Elsevier homepage (http://elsevier.com) by selecting "Customer Support" and then "Obtaining Permissions." Library of Congress Cataloging-in-Publication Data Weiss, Jason. Java cryptography extensions : practical guide for programmers / Jason Weiss. p. cm. Includes bibliographical references and index. ISBN 0-12-742751-1 1. Java (Computer program language) 2. Cryptography. I. Title. QA76.73.J38W445 2004 005.8t2--dc22 2003070900 For information on all Morgan Kaufmann publications, visit our Web site at www.mkp.com. Printed in the United States of America 04 05 06 07 08 5 4 3 2 1
  • 11. For my wife Meredith and our son Kyle, whom I love more dearly than anything else
  • 13. Contents Preface ix Understanding Java's Cryptographic Architecture 1 1.1 Java and Cryptography 3 1.2 Java Cryptography Architecture 4 1.3 Java Cryptography Extension (JCE) 7 1.4 Understanding the Service Provider Interface Architecture 1.5 Installing Providers 9 1.5.1 Static Provider Registration 10 1.5.2 Dynamic Provider Registration 11 JCA Helper Classes 13 1.6.1 The Security Class 13 1.6.2 The Provider Class 14 1.6.3 1.6 1.7 1.6.4 1.6.5 Working with Jurisdiction Policy Files Code Example: Obtaining a List of Installed Providers, Formal Names 15 Code Example: Listing a Provider's Supported Algorithms 19 Code Example: Obtaining a List of Installed Algorithms 22 27 Working with Symmetric Ciphers 29 2.1 Random Number Generation 30 vii
  • 14. viii Contents [] 2.2 2.3 2.4 2.5 2.6 2.7 2.8 2.9 The SecureRandom Engine 31 2.2.1 Code Example: Generating Random Values 32 The KeyGenerator Engine 33 2.3.1 Algorithm Independent Initialization 34 2.3.2 Algorithm Specific Initialization 35 2.3.3 Obtaining the Symmetric Cipher Key via SecretKey Class 35 Avoiding Opaque Keys 36 2.4.1 Code Example: Converting a Key into a Key Specification, Option 1 36 2.4.2 Code Example: Converting a Key into a Key Specification, Option 2 39 Categorizing Symmetric Ciphers 40 2.5.1 Key Management 41 2.5.2 Non-Repudiation 41 2.5.3 Data Integrity 42 Padding and Cipher Modes 42 2.6.1 Padding 43 2.6.2 Cipher Modes 44 The Cipher Engine 46 2.7.1 Initializing the Engine 48 2.7.2 Code Example: Block Cipher Encryption 49 2.7.3 Code Example: Secure Streaming Cipher Encryption 52 2.7.4 Code Example: Secure Streaming Cipher Decryption 55 Password Based Encryption 59 2.8.1 Code Example: Password Based Encryption with a Message Digest and an Encryption Algorithm 60 Bringing Order to Chaos: Picking a Cipher 64 2.9.1 DES 64 2.9.2 DESede a.k.a. TripleDES 64 2.9.3 Advanced Encryption Standard (AES) 64 2.9.4 Blowfish 65 Working with Asymmetric Ciphers and Key Agreement Protocols 67 3.1 The KeyPairGenerator Engine 69 3.1.1 Code Example: Algorithm Independent Key Pair Generation 69 3.1.2 Comparing Symmetric and Asymmetric Keys 71 3.1.3 Persistinga Key: Key Encodings Defined 72 3.1.4 Code Example: Inspecting Key Encodings 72
  • 15. 9 Contents iX 3.2 3.3 3.4 3.5 3.1.5 Code Example: Loading an X.509 Encoded Public Key from Disk 75 3.1.6 Code Example: Loading a PKCS#8 Encoded Private Key from Disk 76 Revisiting the Cipher Engine 78 3.2.1 Code Example: Encrypting a File with a Public Key 78 3.2.2 Code Example: Decrypting a File with a Private Key 81 Comparing Keys for Equality 84 Looking to the Future: Elliptic Curve Cryptography 84 3.4.1 Asymmetric Cipher Wrap-up 85 The KeyAgreement Engine 85 3.5.1 Code Example: Key Exchange to Establish a Secure Channel 86 4 Message Digests, Message Authentication Codes, and Digital Signatures 101 4.1 Choosing a Message Digest Algorithm 4.1.1 An Overview of an MD5 102 4.1.2 An Overview of SHA-1 103 4.1.3 An Overview of RIPEMD 103 4.2 4.3 4.4 4.5 102 The MessageDigest Engine 103 4.2.1 Code Example: Generating a Message Digest 4.2.2 Message Digest Performance 106 4.2.3 Understanding Message Digest Shortcomings The Mac Engine 107 4.3.1 Code Example: Generating a Hashed MAC Digest 4.3.2 Understanding MAC Shortcomings 110 Digital Signatures 111 The Signature Engine 113 4.5.1 4.5.2 103 107 108 Code Example: Generating a Digital Signature Using a Private Key 113 Code Example: Verifying a Digital Signature Using a Public Key 115 Managing Keys and Certificates 119 5.1 The Need for Key Management 119 5.2 Digital Certificates Defined 120 5.3 The KeyStore Engine 121 5.3.1 The keytool Utility 124
  • 16. X Contents u 5.4 5.5 Bibliography Index 155 5.3.2 Code Example: Storage of a Symmetric Cipher Key 127 5.3.3 Code Example: Retrieving a Symmetric Cipher Key 130 5.3.4 A Word on Key Store Password Management 132 The CertificateFactory Engine 132 5.4.1 5.4.2 5.4.3 5.4.4 5.4.5 5.4.6 Conclusion Process for Requesting a Certificate Signed by a CA 136 Certificate Revocation List (CRL) 137 Code Example: Encryption with a Digital Certificate 139 Code Example: Decryption with a Private Key 142 RSA Encryption Limitations 145 Code Example: Combining RSA with a Secret Key 145 150 153
  • 17. Preface I've always exhibited a deep enthusiasm for computers and software development. In fact, I wrote some of my first software applications before I finished the sixth grade. However, it wasn't until I joined the U.S. Navy as a Cryptologic Technician that I became interested in cryptography, or more specifically cryptanalysis. Most people oversimplify cryptography. "Yeah, we're secure; we encrypt our data." That Means Nothing. How strong is the key? What is the key's effective bit size? Which cipher mode was employed? How are you managing the key(s)? Did you use the right type of cipher for the job at hand? Is the data padded? Are you merely storing the data in an encrypted state, or are you broadcasting it across a network? People also often are confused about where the boundaries of cryptography lie. Generally, the field of cryptography includes encryption, one-way hashes, digital signa- tures, and various digital-certificate-related technologies (becaue the certificates are built around keys typically used in either digital signature or encryption operations). Authen- tication is only associated with cryptography, for example, to the extent of the inherent relationship that exists between a public and private key pair and that if the public key can decipher that signature, then we've authenticated that the private key had to be used in the encryption of that hash. Authorization is certainly well beyond the boundaries of cryptography, so don't expect any discussion of Access Control Lists (ACL) or group man- agement here. If you are looking for this type of material, you should look into the Java Authentication and Authorization Specification (JAAS). One of the early challenges I faced when I started designing and writing software that employed cryptographic algorithms was making sense of it all. There seemed to be an endless stream of terminology! What is the difference between Electronic Codebook Mode xi
  • 18. xii Preface 9 and Cipher Block Chaining? How do I know if l should choose a symmetric cipher over an asymmetric cipher? And once I understood the differences between these and knew to choose a symmetric cipher, I was still faced with the daunting task of picking which symmetric cipher to use, that is, which physical implementation of a symmetric cipher. Identifying that you need some form of cryptography in your application is elemen- tary. Even an executive-type can make a statement like "boy, we better protect that data!" Where to go from there is the major challenge. Target Audience This book is intended for software engineers who are experienced in Java but have lit- tle to no experience with cryptography. I assume that if you're holding this book you have an advanced understanding of terms like authentication, digital certificate, public key, encryption, and so on. We will review more advanced topics, such as cipher modes, padding structures, and so on, where applicable. Cryptography is an "on-demand" programming exercise for most engineers. On demand, it is coded once and tested, and then focus shifts to the business problem for the next n months of the project. As a result, it's very easy for even the most experienced Java engineer to become rusty on cryptographic concepts, because they aren't used on a daily basis. This book will address this problem head on, keeping definitions and code examples at your fingertips for times when they are needed. This book was planned and written to solve two distinct problems that software engineers face after they reach the conclusion that they need to employ some form of a cryptographic architecture in their design. First, cryptography is a world unto itself, in which most texts present complex mathematical calculations ad nauseum. As professional software engineers, we face increasingly tighter deadlines and simply don't have the time to fully understand the underlying mathematical theorems at work behind an algorithm. While the underlying math is very important, we'll leave that work to the researchers at universities around the world. I openly admit that there are many researchers who possess mathematical skills exponentially greater than mine, and they can explain to you why the algorithm I'm using--which passed public scrutiny at their level--is considered crypto- graphically secure. Thus, I've worked very hard to gloss over mathematical concepts, and included references where applicable to sources that can provide insight into the math- ematics if you're so inclined. However, we still have a responsibility to become fluent in the terminology of the cryptographic universe if we are going to make informed design decisions. This text will help you achieve the minimum fluency requirement for the lan- guage of cryptography by discussing the various cryptographic engines that are exposed via the Java Cryptology Architecture (JCA) and the Java Cryptography Extensions (JCE). Once you employ your cryptographic fluency and determine that your design requires a block cipher using a 128-bit key PKCS#5 padding and a CBC cipher mode, you sud- denly realize that scope and magnitude of your second problem; how do I write that in Java quickly? This is the second distinct problem this book intends to help you solve.
  • 19. 9 Preface xiii To accomplish this, a substantial amount of time was spent to provide real-world code samples in discrete pieces that you can choose from a la carte. Ideally you'll just copy and paste the code I've written into your code and expand it/customize it from there. Code Examples Sun's JDK 1.4.1 release was used to author all of the code examples you hold here. The development was done primarily on an Apple PowerMac G4, and testing was done on a Windows XP box as well. Approximately 75% of these samples work with an unextended version of the JCA/JCE, but other more complex algorithms like RSA encryption require the download and installation of a 3rd-party JCE provider. To download the code examples in .zip format, access http://www.mkp.com and find this book's page by searching in the online catalogue. There is a close relationship between the code example's JavaDocs and the book. Each code sample explicitly points back to the section in the book, making it easy to locate the corresponding text that explains the sample. For clarity, code examples in the early chapters have been entirely self-contained, including coding techniques not directly related to the material being discussed, like Java I/O operations. Later in the book a single utility class is incorporated into the code examples. The reason for this utility class is twofold: to shrink the size of the code examples and to allow you to focus on the material at hand (not Java I/O). The following is a partial listing of the helper methods present in this class, and the names give an indication of their relationship to Java I/O operations: 9 loadPublicKey() 9 readCipherTextFile() 9 readFromSocketChannel() 9 readPlainTextFile() 9 byte2Hex() 9 toByteArray() 9 toHexString() 9 writeCipherTextFile() You may choose to include this utility class in your application, or copy/paste pertinent methods from it into an existing utility class your application may already define. Each code sample expands each exception that might be thrown into its own code block. This was done intentionally, for two reasons. First, when you paste the code you won't have to hunt around the JavaDocs to locate all of the exceptions you need to catch for the code you're using. And perhaps more importantly, to encourage you to take that extra three minutes to use Java's robust exception-handling architecture properly instead of just catching everything using a lonely catch (Exception e) code block.
  • 20. xiv Preface " To make it easier for you to reuse the code samples in your application, when applica- ble, code examples either declare or have commented out dynamic registration of both the Legion of the Bouncy Castle JCE Provider and the Cryptix JCE Provider. This provides both the code fragment to register the provider so you don't have to look it up, and more impor- tantly, a visual cue that the algorithm you need to use is probably not natively supported by Sun's JDK 1.4.1 and will require an extra .jar file when you deploy. Whenever a 3rd-party JCE provider was required, the code arbitrarily chose to dynamically register the providers in positions 5 and 6, respectively. The code sam- ples can be built using Apache Ant. For documentation on how to use Apache Ant, see http://ant.apache.org. Whenever the samples need to perform file access, they refer to the root directory. Depending upon your permissions (especially if you are using a *nix system) you may need to adjust these paths to be rooted in your home directory. Throughout the text I refer to the Java SDK as $JAVA_HOME. Since this is a developer- oriented book, it is assumed that you have the complete SDK installed and not simply a Java Runtime Environment (JRE). When moving to a production environment where the SDK may not be available, be sure to substitute $JAVA_HOME/jre/lib/ext with $JRE_HOME/lib/ext where applicable. For consistency, throughout the text we use $JAVA_HOME notation. Code examples use a smaller 9 point Courier font like this throughout the text. In the longer code examples (specifically the KeyAgreement examples) key blocks have been identified with a 15% gray shade and individual labels. The labels are referred to specifically in the body of the text. Acknowledgments It is impossible for an individual to author a book like this without some help. In particular I would like to thank my acquiring editor Karyn Johnson and my technical editor Jeff Donahoo for their invaluable feedback and guidance throughout the entire process. Special thanks go out to Reed Shilts for reviewing and verifying the code samples provided with the book for completeness, accuracy, and cross-platform "gotchas" that I failed to catch when I initially wrote them. I'd also like to thank all of the following reviewers who provided great feedback on the draft chapters: Michael Parks, Uwe Guenther, Anthony Nadalin, and Jon Eaves. Their input helped to shape the book you hold in your hands today. Organization of this Book Chapter 1 focuses on introducing the Java Cryptography Architecture and the Java Cryp- tography Extensions. Additionally, it demonstrates the usefulness of the Security and Provider classes. Chapter 2 centers on symmetric cryptography operations, including the generation of cryptographically secure pseudo-random number generators (CSPRNG), generation of secret keys, and working with the Cipher engine.
  • 21. 9 Preface XV Chapter 3 builds on our knowledge of how the Cipher engine works, introducing asymmetric ciphers. A discussion of key agreements between 2 or more parties is also included in this chapter. Chapter 4 introduces the message digests, message authentication codes and digital signatures. The theme of this chapter is how to ensure the content of a document didn't change. Chapter 5 details the uses of a key store for tracking secret keys, key pairs and digital certificates. It also demonstrates how digital certificates can be used for encryption. Finally For those of you who like really hard puzzles, here are cryptographic puzzles that pay you cash prizes for winning: http://www.rsasecurity.com/rsaiabs/challenges These contests directly attest to the differences in strengths between symmetric and asym- metric algorithms and the inability to effectively compare one to the other. If this book exposes an excitement about cryptology you never knew was in you, I encourage you to nurture your curiosity. For learning the history of codes and ciphers, one of the best books I've found on this topic is by Fred B. Wrixon, titled Codes and Ciphers & Other Cryp- tic & Clandestine Communication, published by Black Dog & Leventhal Publishers, ISBN 1-57912-040-7.
  • 23. Cryptography has its roots in very complex (and often theoretical) mathematics. As a result, computers and cryptography complement each other well. Today's advanced cryptographic operations involve mind-boggling amounts of mathematical calculations, and computers perform these calculations exponentially faster than a human can perform them by hand. The Java language includes a well-defined architecture that allows you to include cryptographic services in your designs without fully comprehending the mathe- matical proofs or calculations behind the algorithms. However, this does not mean that it is not important to understand the algorithms (i.e., the cryptographic tools) at your disposal. As an analogy, a screwdriver is a wonderful tool for driving a wood screw into a piece of wood; however, that same screwdriver would not be effective if the object being driven was a finishing nail. Performing cryptographic operations with Java does not involve hundreds of lines of code or require a Ph.D. in mathematics from MIT. Perhaps the most visible aspect of cryptography is encryption, which can be accomplished in Java using as little as seven lines of code, not counting proper exception handling. Here is a brief example demon- strating a simple encryption operation. Don't worry about comprehending every aspect of the program just yet--we have the whole book to explore Java's cryptographic capabilities! NOTE: Please review the preface for code style information and download instructions. Example I. I Sample Code Location: com.mkp.jce.chapl.SmallExample try
  • 24. Chapter 1" Understanding Java's Cryptographic Architecture 9 //Lookup a key generator for the DES cipher KeyGenerator kg = KeyGenerator.getlnstance("DES"); //Generate a secret key that can be used by the DES cipher SecretKey key = kg. generateKey() ; SecretKeySpec keySpec = new SecretKeySpec(key.getEncoded(), "DES") ; //Lookup an instance of a DES cipher Cipher cipher = Cipher.getlnstance("DES") ; //Initialize the cipher using the secret key cipher, init (Cipher.ENCRYPT_MODE, keySpec) ; //Encrypt our message String plainText = "This is a secret message"; byte[ ] cipherText = cipher.doFinal(plainText.getBytes()) ; System.out.println("Resulting Cipher Text:n"); for(int i=0;i<cipherText.length;i++) { System.out.print(cipherText[i] + ....); } System.out.println( .... ); } catch (Exception e) { e.printStackTrace () ; } This example demonstrates some of the core tenets of cryptography with Java in action. It shows the creation of a secret key that is used to translate an unencrypted message into
  • 25. 9 1.1 Java and Cryptography Figure 1.1: Java's cryptographic libraries. an encrypted one. The output of this sample will differ each time it is run because the key is essentially random; when I ran it the output looked like this: Resulting Cipher Text: 106 93 20 33 -86 -ii0 109 87 57 31 95 5 -67 36 -39 -7 117 -50 119 -26 -51 -40 118 105 68 5 -29 -47-90 -89 -70 84 The example also demonstrates the use of engine classes,classes that are not instantiated directly. Alas, we do not want to get ahead of ourselves, so we will rewind and start by defining Java's cryptographic infrastructure. 1.1 Java and Cryptography From its humble birth through its present day incarnation, the Java language continues to offer developers a computing platform that swells with cryptographic functionality. Because of U.S. export laws at the time, the functionality is split between two different libraries, the JAVA Cryptography Architecture (JCA) and the Java Cryptography Extensions (JCE). Figure 1.1 shows the relationship between these two cryptographic libraries, display- ing some of the capabilities covered throughout this book. The first library, JCA, is tightly integrated with the core Java APIs. The second library, JCE, builds off of the concepts and capabilities found in the JCA. The JCE houses many of the advanced cryptographic opera- tions that were previously under U.S. export control. However, the political landscape has changed, and as of JDK 1.4, the JCA and JCE are present "out of the box" without requiring a separate download of the JCE. JCE 1.2.2 remains available as a separate download for JDK 1.2 and 1.3 installations, and it supports the same suite of engines found in JDK 1.4. Cryptography is often associated with the sole process of encryption/decryption; however, the true scope of the field is actually much larger than this, encompassing a wide array of operations to include: 9 Message digests or hashing 9 Message authentication codes 9 Digital signatures
  • 26. Other documents randomly have different content
  • 27. nips off d' guard as I says when he slugs him wit 'd' billy. Joe lets himself into d' cage wit' that. “Now, d' key to d' outside door ain't in d' coop at all. There's an old stiff of a dep'ty sheriff planted outside wit' that. As Joe opens d' inside door, he raps on d' bars of d' cage wit' his key, an' it's d' tip for this outside snoozer to unlock his door. Of course he plays Joe for d' guard coinin' out from his rounds. “It's at this door-slammin' pinch where Joe's luck comes in, an' relieves him of d' chanct of d' gang of dep'ties in d' office tumblin' to him. Just as Joe raps to d' sucker on d' outside door, an' then lets himself into d' cage, a gun goes off inside d' jail. It's Joe's guard. Joe forgets to pinch d' pop, see! an' this gezebo gets his hooks onto it, all tied like he is, an' bangs away wit' it in his pockets so as to warn d' gang Joe's loose. “'That does me for fair!' t'inks Joe when he hears d' gun; ''dey gets me dead to rights!' “Say! it was d' one trick that saves him! At d' bang of d' gun every dep'ty leaps to his trilbys an' comes chasin'. D' outside mark has just unslewed his door. He flings it wide open an' scoots inside d' cage. Joe t'rows d' inside door open—for Joe's dead swift to take a hunch that way—an 'd' outside guard an 'd' entire bunch of dep'ties goes sprintin' into d' jail. Then Joe locks 'em all in an' loafs t'rough d' offices into d' street. “Yes; Joe knows where he's goin'. He toins into d' foist stairway an' climbs one story to a law office, which d' crooks outside has fixed to be open, waitin' for him. Nixie; d' law guy ain't in on d' play. A dip named Jim Butts comes an' touts this law sharp away, an' cons him into goin' out six miles to d' country to draw d' last will an' test'ment of a galoot he says is on d' croak, an' can't wait for mornin'. Yes, Butts has one of his mob faked up for sick, an' dey detains d' law guy four hours makin' d' will. This stall of Butts, who's doin' d' sick act, sets up between gasps an' gives away more'n twenty million dollars wort' of wealt'. This crook who's fakin' sick is on his uppers at d' time, an' don't really have d' price of beer; but to hear him make
  • 28. his will that night, you'd say he was d' richest ever; d' Astors was monkeys to him. “As I states, Joe skips into this lawyer's office, d' same bein' open for d' poipose, an' one of d' 'fambly' holdin' it down. While Joe's in there he hears d' chase runnin' up an' down in d' street below d' window. “Not for long, though. Fifteen minutes after Joe is outside d' jug, one of d' crooks calls up d' Central Office be telephone. “'Who's talkin'?' asts d' captain at d' Central Office. “'It's Doyle, lieutenant o' police, Fourt' Precinct,' says d' crook who's on d' wire. Me man on d' station house beat just reports Joe Dubuque drivin' west on Detroit street wit' a horse an' buggy. He was on d' dead run, lamin' loose to beat four of a kind. Send all d' men youse can spare.' “An' that's what d' captain at d' Central Office does. In ten minutes every cop an' fly cop is on d' chase, a mile away from Joe, an' gettin' furder every secont, see! “After a while it settles down all quiet an' dead about d' jail, an 'd' little old law office where Joe lies buried. He, an' d' crook who's waitin' for him, is chinnin' each other in whispers. All d' time Joe's got his lamps to d' window pipin' off d' other side of d' street. At last a cab drives up opposite d' law office an' stops. A w'ite han'kerchief shows flutterin' be d' window. It's Wild Willie who's inside. “Joe's pal gets up an' goes down to d' street. All's clear an' he w'istles up to Joe. When he gets d' office Joe sort of loafs down an' saunters over to d' cab. D' door opens an' in one move Joe's inside, an' d' nex' his arm is 'round his Moll. She's all right, this Wild Willie is, an' Joe does d' correct t'ing to give her d' fervent squeeze. “That's d' end. Joe Dubuque runs clear away, goes under cover, an' d' sheriff never gets his hooks on him ag'in. As Joe drives be d' jail he can still hear them captiffs singin' 'Rock of Ages.' “'Say!' says Joe to Wild Willie as he toins her mug to his an' smacks her onct for luck, 'I won't do a t'ing but make it a t'ousand
  • 29. dollars in d' kecks of them ducks who's doin' that song. I'll woik d' dough to 'em be some of d' boys, see!'”
  • 30. B BINKS AND MRS. B. INKS was an excellent man, hard-working and sober. He made good money and took it home to his wife for her judgment to settle its fate; every dollar of it. Mrs. Binks was a woman among a thousand. When taken separate and apart from his wife and questioned, Binks said she was a “corker.” Binks declined all attempts at definition, and beyond insisting that Mrs. Binks was and would remain a “corker,” said nothing. From what was told of Mrs. Binks by herself, it would seem that she was a true, loving wife to Binks, and that, aside from the duty every woman owed to her sex and the establishment of its rights in all avenues of life, she held that with the wedding ring came a list of duties due from a good woman to her husband, which could not be avoided nor gone about. “Some women,” quoth Mrs. B., “worry their husbands with a detail of small matters. A woman who is to be a helpmeet to her husband, such as I am to Binks, will be self-reliant and decide things for herself. In the little cares of life which fall to her share, let her go forward in her own strength. What is the use of adding her troubles to his? If she has plans, let her execute them. If problems confront her, let her solve them. If she tells her husband aught of the thousand little enterprises of her daily home life, then let it be the result. When success has come to her, she may call her husband to witness the victory. Aside from that she should face her responsibilities alone.” Of course Mrs. B. did not mean by all this that she would not be open and frank with Binks, and confide in him if a burglar were in the house, or if the roof took fire in the night that she would not arouse Binks and mention it. What she did mean was that when it came to such things as dismissing the servant girl, the wife should gird up her loins and “fire” the maiden singlehanded, and not ring
  • 31. her husband in on a play, manifestly disagreeable, and likely to subject him to great remorse. It chanced recently that an opportunity opened like a gate for Mrs. B. to illustrate her doctrine that wives should proceed in a plain duty alone, without imposing needless anxiety on the head of the family. Mrs. Binks had decided to visit her sister in Hoboken. She was to go Thursday, and Binks, who was paid his sweat-bought stipend on Monday, was to furnish the money Monday evening wherewith to make the trip. It chanced, unfortunately, that pay-day this particular week was deferred. The head partner was sick, or out of town; checks could not be drawn, or something like that. “But your money will come on Saturday, boys,” said the other partner. Binks was obliged to wait. The money was all right; it would be accurately on tap Saturday, so Binks took no fret on that point. But what was he to do about Mrs. B.? That good woman was to go Thursday, and in order to organise for the descent upon her relative would need the money—$40—on Tuesday. What was Binks to do? Clearly he must do something. He could not ask Mrs. B. to put off her trip a week; indeed, his reluctance to take such course came almost to the point of superstition. In his troubles Binks suddenly bethought him of a gold watch, once his father's, with a rich chain and guard attached. These precious heirlooms had been given to Binks by the elder Binks' executor, and were cherished accordingly. Rather than disappoint Mrs. B. the worthy Binks decided, that just for once in his life he would seek a pawnbroker and do business with that common relative of all. Binks felt timid and ashamed, but the case was urgent. There was no risk, for his money would float in all right on the tides of
  • 32. Saturday. Binks would then redeem these pledges from disgraceful hock; all would be well. Mrs. B. would be in Hoboken on redemption day, and it would not be necessary to tell her anything about the matter. It would save her pain, and Binks bravely determined to keep the whole transaction dark. Again, if he told her he had not been paid at the store, the brave woman would indubitably wend to his employer's house and demand the reason why. This would be useless and embarrassing. Therefore, Binks would say nothing. He would pawn the ancestral super, and get it again when his money came in, and his wife was away. The watch and its appertainments were snug in the far corner of a bureau drawer; away over and behind Mrs. B.'s lingerie. Binks had a watch of his own, a Waterbury, with a mainspring as endless as a chain pump. Mrs. B. saw, therefore, no reason why he should carry the gold watch of his progenitor. Binks might lose it. Mrs. Binks strongly advised that it be kept in the bureau where it would be safe and naturally, in an affair of that sort Binks took his wife's advice. Binks reflected that he must secure the watch and pawn it that night. To do this he must plot to get Mrs. B. out of the house. Binks thought deeply. At last he had it. Binks sent a message home in the afternoon and asked Mrs. B. to meet him in a store down town at six o'clock. Then he had himself released at 5:30, and went hotfoot homeward. The coast was clear; Mrs. B. was down town in deference to his stratagem, no doubt believing that Binks meditated soda water, or some other delicacy, as the cause of his sudden summons of the afternoon. She little wotted that she was the victim of deceit. If she had, there would have been woe. Binks rushed at once to the bureau and secured the treasure. He did not wait a moment, but plunged off to a store where the three balls over the door bore testimony to the commerce within. Binks would explain to Mrs. B. on his return, how he had missed her and so failed to keep his date with her down town.
  • 33. The merchant of loans and pledges looked over Binks' timepiece, and then, as Binks requested, gave him a ticket for it and $40. It was to be redeemed in thirty days or sooner. And Binks was to pay $44 to get it again. Binks was very willing. Anything was wiser and better than to permit Mrs. B.'s visit to her sister to be interrupted. When Binks got home Mrs. B. had already returned. There was a bad light in her eye. She accepted Binks' excuses and explanations as to “how he missed her down town” with an evil grace. She as good as told Binks that he deceived her; that if the phenomenon were treed she would find another woman in the case. However, Binks had the presence of mind to turn over the $40 he reaped on the watch; and as he expressed it later: “That sort of hushed her up.” The next day Binks returned to his labours, while Mrs. B. repaired to the marts to plunge moderately on what truck she stood in want of for her trip. When Mrs. B. got back to the house it chanced that the first thing she needed was in the fatal drawer. She opened it. Horrors! The watch was gone! There was naught of hesitation; Mrs. B. knew it had been stolen. Anybody could see that from the way every garment had been carefully laid back to hide the loss. What should she do? The police must at once be notified. Mrs. B. pulled on her shaker and scooted for the police station. She told her story out of breath. She left her house at three o'clock and was back at four o'clock, and in that short hour her home had been entered and looted of its treasures. Made to be specific, Mrs. B. said the treasures were a watch and chain, and described them. “What were they worth?” asked the sergeant of the detectives. Mrs. B. considered a bit, and then said they would be dog cheap at $1,000. She reflected that the sum, if published in the papers, would be a source of pride.
  • 34. The sergeant of detectives told Mrs. B. his men would look about for her property, and should they hear of it or find it they would at once notify her. “You bet your gum boots! ma'am,” said the sleuth confidently, “whatever crook's got your ticker, he's due to soak it or plant it some'ers in a week. Mebby he'll turn it over to his Moll. But the minute we springs it, ma'am, or turns it up, we'll be dead sure to put you on in a jiff.” “Thank you,” said Mrs. B. Then Mrs. Binks went home and, true to her determination to save Binks from unnecessary worry, she told him nothing of the loss nor of her arrangements for the watch's recovery. “What's the use of bothering Binks?” she asked herself. “All he could do would be to notify the police, and I've done that.” Thursday came and Mrs. B. set forth for Hoboken. No notice had come from the police. Binks was glad to see her go. He had lived in fear lest she come across the departure of the watch. He breathed easier when she was gone. As for Mrs. B., as she had not heard from the police, there was nothing to tell Binks; wherefore, like a self- reliant woman who did not believe in making her husband unhappy to no purpose, she left without word or sign as to her knowledge of the watch's disappearance. It was Friday; ever an unlucky day. Binks was walking swiftly homeward. Binks was thinking some idle thing when a hand came down on his shoulder, heavy as a ham. “Hold on, me covey; I want you!” Binks looked around, scared and startled. He had been halted by a stocky, bluff man in citizen's clothes. “What is it?” gasped Binks. “Suttenly, sech a fly guy as you don't know!” said the bluff man, with a glare. “Well! never mind why I wants you; I'm a detective, and you comes with me.” And Binks went with him.
  • 35. Not only that, Binks went in a noisy patrol wagon which the detective rang for; and it kept gonging its way along and attracting everybody's attention. The word went about among his friends that Binks was drunk and had been fighting. “And to think a man would act like that,” said one lady, who knew Binks by sight, “just because his wife is away on a visit! If I were his wife I'd never come back to him!” At the station Binks was solemnly looked over by the chief. “He's the duck!” said the chief at last. “Exactly old Goldberg's description of the party who spouts the ticker. Where did you collar him, Bill?” “I sees him paddin' along on Broadway,” replied the bluff man, “and I tumbles to the sucker like a hod of brick. I knowed he was a sneak the first look I gives; and the second I says to meself, 'he's wanted for a watch!' Then I nails him.” “Do you know who he is?” asked the chief. “My name,” said Binks, who was recovering from the awful daze that had seized him, “my name is B——” “Shet up!” roared the bluff man. “Don't give us any guff! It'll be the worse for you!” “I know the mark,” said an officer looking on. “His name is 'Windy Joe, the Magsman.' His mug's in the gallery all right enough; number 38, I think.” “That's correct!” said the chief. “I knowed he was familiar to me, and I never forgets a face. Frisk him, Bill, and lock him up!” “But my name's Binks!” protested our hero. “I'm an innocent man!” “That's what they all says,” replied the chief. “Go through him, Bill, and lock him up; I want to go to me grub.” Binks was cast into a dungeon. Next door to him abode a lunatic, who reviled him all night. On the blotter the ingenuity of the chief
  • 36. detective inscribed: “Windy Joe, the Magsman, alias Binks. Housebreaking in daytime.” There is scant need of spinning out the agony. Binks got free of the scrape some twelve hours later. But it was all very unfortunate. He came near dismissal at the store, and the neighbours don't understand it yet. They shake their heads and say: “It's very strange if he's so innocent, why he was locked up. When the police take a man, he's generally done something.” “I'm not sorry a bit!” said Mrs. B., when she was brought back from Hoboken on Saturday by a wire the police allowed Binks to send her. “And when I saw him with the officers, I was as good a mind to tell them to keep him as ever I had to eat. To think how he deceived me about that watch, allowing me to break my heart with thoughts of it being stolen! I guess the next time Binks sneaks off to pawn his dead father's watch, he'll let me know.”
  • 37. I ARABELLA WELD (By the Office Boy) I t was a chill Harlem evening. The Undertaker sat in his easy chair smoking his pipe of clay. About him were ranged the tools and trappings of his gruesome art. On trestles, over in the corner's gliding shadows, lay the remains he had just been monkeying with. At last, as one who reviews his work, the Undertaker arose, and scanned the wan map of the Departed. “He makes a great front,” mused the Undertaker. “He looks out of sight, and it ought to fetch her.” Back to his chair roamed the Undertaker. As he seated himself he touched a bell. The Poet of the establishment glided dreamily in. The Undertaker, not only straightened the kinks out of corpses to the Queen's taste, but he furnished epitaphs, and as well, verses for those grief-bitten. These latter were to run in the papers with the funeral notice. “Have youse torn off that epitaph for his jiblets?” asked the Undertaker, nodding towards Deceased. “What was it you listed for?” asked the Poet. “D' epitaph for William Henry Weld,” replied the Undertaker. The Poet passed over the desired epitaph. William Henry Weld. (Aged 26 years.)
  • 38. P His race he win with pain and sin, At Satan he did mock; St. Peter said as he let him in: “It's Willie, in a walk!” “You're a wonder!” cried the Undertaker, when he had finished the perusal, and he gave the Poet the glad hand. “Here's d' price. Go and fill your tank.” “That should win her,” reflected the Undertaker, when the poet had wended his way; “that ought to leave her on both sides of d' road. What I've done for Deceased, and that epitaph should knock her silly. She shall be mine!” II UBLIC interest having been aroused in the corpse, it may be well to tell how it became that way. Deceased was William Henry Weld. Five days before the opening of our story, William donned his skates and lined out on one of his periodicals. For four days he debauched to beat four kings and an ace. And William had adventures. He paid a fine; he fell down a coal hole; he invaded a laundry and administered the hot wallops to the presiding Chinaman. On the fourth day he declared himself in on a ball not far from Sixth Avenue. “Ah, there!” quoth William, archly, to a beautiful being to whom he had not been introduced. “Ah, there! Tricksey; I choose youse for d' next waltz.” “Nit; not on your life!” murmured the beautiful one. As William Henry Weld was about to make fitting response, a coarse, vulgar person approached.
  • 39. “What for be youse jimmin' 'round me pick?” asked this person. “That's d' stuff, Barney!” said the beautiful one. “Don't do a t'ing to him!” The next instant William Henry Weld was cast into outer darkness. “It's all right, Old Man!” said the friend who rescued William Henry Weld, “I'm goin' to take youse home. Your wife ain't on to me, an' I'll fake it I'm a off'cer, see! I'll give her d' razzle dazzle of her existence, an' square youse wit' her.” “It's Willie!” said the friend to Arabella Weld, as he supported her husband into the sitting-room. “It's Willie, an' he's feelin' O. K. but weedy. Me name, madam, is Jackson—Jackson, of d' secret p'lice. Willie puts himse'f in me hands as a sacred trust to bring him home.” “Is he sick?” moaned Arabella Weld, as she began to let her hair down, preparatory to a yell. “Never touched him!” assured the friend. “Naw; Willie's off his feed a bit. You sees, madam, Willie hired out to a hypnotist purely in d' interest of science, an' he's been in a trance four days, see! That's why he ain't home. Bein' in a trance, he couldn't send woid. Now all he needs is a rest for, say, a week. Oughtn't to let him get out of his crib for a week.” At 4 o'clock the next morning William Henry Weld began to see blue-winged goats. Arabella Weld “sprung” a glass of water on him. “Give it a chase!” shrieked William Henry Weld, wildly waving the false beverage aside. In his ratty condition he didn't tumble to the pure element's identity, but thought it was one of those Things. At 5 o'clock A. M. William Henry Weld didn't do a thing but perish. When the glorious sun again poured down its golden mellow beams, the Undertaker had his hooks on him and Arabella Weld was a widow. III
  • 40. B UT to return to the Undertaker, the real hero of our tale. We left him in his studio poring over the epitaph of William Henry Weld, while Departed rehearsed his dumb and silent turn for eternity in the corner's lurking shadow. At last the Undertaker roused himself from his reveries. “I must to bed!” he said; “it waxeth late, and tomorrow I propose for her in wedlock.” Next morning the Undertaker arose refreshed. He had smote his ear for full eight hours. He felt fit to propose for his life, let alone the delicate duke of Arabella Weld. The Undertaker's adored one was to come at noon. She wanted to size up Departed prior to the obsequies. Although it was but 9 o'clock, the Undertaker had to get a curve on himself to keep his date with Arabella Weld at midday. He had an invalid to measure for a coffin—it was a riveted cinch the party would die—and then there was a corpse to shave in the next block. These duties were giving him the crowd. But our hero made it; played every inning without an error, and was organised for Arabella Weld when she arrived. As they stood together—Arabella and the man who, all unknown to her, loved her so madly—looking down at Deceased, she could not repress her admiration. “On d' dead! I never saw Willie look so well,” she said. “He's very much improved. You must have taken a woild of pains wit' Willie.” The Undertaker was silent. Struck by this, Arabella Weld turned her full lustrous lamps on the Undertaker and saw it all. It was for her, the loving heart beside her had toiled over Deceased like an artist over a picture. Swift is Love, and the Undertaker, quivering with his great passion, twigged in an instant that Arabella was onto him. A vast joy swept his heart like a torrent. “I wanted him to make a hit for your sake,” he whispered, stealing his arm about her.
  • 41. O Arabella softly put his arm away. “Not now,” she sighed. “It would be too soon a play. We must wait until we've got Willie off our hands—we must wait a year.” “Wait a year!” and the pain of it bent the Undertaker like a willow. “Wait a year, dearest! Now, what's d' fun of that? You must take me for a farmer!” and his tones showed that the Undertaker was hurt. “But in Herkimer County they wait a year,” faltered Arabella, wistfully. “Sure! in Herkimer!” consented the Undertaker; “but that's Up-the- state. A week in Harlem is equal to a year in Herkimer. Let it be a week, love!” “This isn't a game for Willie's life insurance?” and great crystals of pain and doubt swam in Arabella's glorious eyes. “Oh, me love!” cried the Undertaker, fondly, yet desperately, “plant d' policy wit' Willie! Send it back to d' company if youse doubts me, an' tell 'em to call d' whole bluff a draw.” The bit of paper, containing the epitaph, fluttered to the floor from her nerveless mits, her beautiful head sank on the broad shoulder of the Undertaker, and her tears flowed unrestrained. IV ne week had passed since William Henry Weld was solemnly pigeon-holed for eternal reference. The preacher received the couple in his study. “Shall I marry you with the prayer-book, or would youse prefer the short cut?” he asked. “Marry us on a deck of cards, if you choose!” faltered Arabella. Her eyes sought the floor, while the tell-tale blushes painted her lovely prospectus. “Only cinch the play, an' do it quick!”
  • 43. N THE WEDDING (Annals of The Bend) aw; I'm on I'm late all right, all right; but I couldn't help it, see!” Chucky was thirty minutes behind our hour. I'd been sitting in the little bar in sickening controversy with one of the vile cigars of the place waiting for Chucky. For which cause I was moved to mention his dereliction sharply. “Sorry to keep an old pal playin' sol'taire, wit' nothin' better to amuse him than d' len'th of rope youse is puffin',” continued Chucky in furtive excuse, “but I was to a weddin' an' couldn't breakaway. That's w'y I've got on me dress soote. “Say! on d' dead! of course I ain't in on many nuptials; but all d' same I likes to go. I always comes away feelin' so wise an* flossy an* cooney. Why, I don't know, unless it's 'cause d' guys gettin' hitched looks so much like a couple of come-ons—so dead sure life is such a cinch, such a sight of confidence like one sees at a weddin', be d' parts of d' two suckers who's bein' starred, never omits to make me feel too cunnin' to live for d' whole week after. “Sure! this weddin' was a good t'ing; what youse might call d' real t'ing; an' it's a spark to a rhinestone it toins out all hunk for d' folks involved. Who's d' two gezebos who gets nex' to each other? D' groom is d' boss gunner of one of our war boats, an 'd' skirt is d' cash goil in d' anti-Chink laundry on Great Jones street. “An' say! that little skirt's a wonder, an' don't youse forget it! She's good any day for any old t'ing I've got; an' all she's got to do is just rap, an' she takes it, see! It was me Rag sees d' goil foist one time when she's down be d' laundry puttin' in me t'ree-sheets for their weekly dose of suds.
  • 44. “Is me Rag an' me married? Say! I likes that, I don't t'ink! Youse is gettin' fanciful in your cupolo. 4 Be me little Bundle an' me married?' says you. Well, I should kiss a pig! Youse can take me tip for it, if we ain't man an' wife be d' longest system d' Cat'lic Choich could play— for me Rag told d' father who 'fficiates that we're out for d' limit— then all I got to stutter is there ain't a mug who's married in d' entire city of Noo York. “Cert! we're married!” Chucky went on after cheering himself with the tankard which the barkeeper placed before him. “If youse had let your lamps repose on this horseshoe scar over d' bridge of me smeller, youse would have tumbled to d' fac wit'out astin'. “How do I win it? I'm comin' up d' stairs like a sucker, just followin' a difference of opinion between me an' me loidy (I soaked her a little one, an' that's for fair! to show her she's off her trolley about d' subject in dispoote), when she cuts loose d' coal bucket at me. Say! she spoiled me map for a mont'. “But to get back to d' little laundry goil. Me Rag, as I says, was in this tub-joint where d' goil woikswit' me linen one day; an' just as she chases in, a fresh stiff who's standin' there t'run some raw bluff at d' little laundry goil she couldn't stand for, see! an' she puts up a damp eye an' does d' weep act. “This little laundry goil is one of them meek, harmless people— rabbits is bull-terriers to 'em—an' so when me onliest own beholds d' tears come chasin down her nose at d' remarks of this fly guy, she chucks me shirts in d' corner an' mounts him in a hully secont. “An' say! me Rag can scrap, an' that's no dream! I don't want none of it. When she an' me has carried d' conversation to d' point where she takes out her hairpins, an' gives her mane to d' breeze, that's me cue to cork. Youse can't get another rise out of me after that: I knows her. “Well! me Rag lights into this hobo who's got gay wit 'd' little goil, an' when she takes her hooks out of his make-up, an' he goes surgin' into d' street, honest! he looks like he's been fightin' a dog. Some lovers of true sport who's there an' payin' attention to d' mill,
  • 45. says this galoot wasn't in it wit' me Rag. She has him on d' blink from d' jump; she win in a loiter. “Takin' her part that way makes d' little laundry goil confidenshul wit' me Rag. It's about two weeks later when she sprints over an' tells Missus Chuck (she makes her promise to lay dead about it, too, but still she passes d' woid to me)—she tells me Rag, as I'm sayin', that she's in trouble. Her steady, she says, is one of d' top notch gunners of one of our big boats; he's d' main squeeze in histurrent, see! an' way up in d' paint. His boat's been layin' at d' Navy Yard, an' now he's ordered to sail for Cuba in a week an' help straighten up d' Dagoes we're havin' d' recent run in wit'. Meanwhiles, she says, dey won't let her beloved have shore leave; an' neither dey won't stand for her to come aboard an' see him. There youse be! a case of dead sep'ration between two lovin' hearts. “D' little laundry goil gives it out cold, she'll croak if she don't get to see her Billy before he skates off for d' wars. She says she knows he's out to be killed anyhow. D' question wit' her is—what's she goin' to do? Dey won't let her aboard d' boat, an' dey won't let him aboard d' land; now, what's d' soon move for her to make? “Well, me Rag—who's got a nut on her for cert—says for her to skip down to Washin'ton an' go ag'inst d' Sec'tary himself. “'Make him a strong talk,' says me Rag; 'give him a reg'lar razzle- dazzle, an' he'll write youse a poiper to them blokes aboard d' boat to let youse see your Billy.' “'Do youse t'ink for sure he will?' says d' little laundry goil. “'Why, it's a walkover!' says me Rag. 'If he toins out a hard game, give him d' tearful eye, see! an' cough a sob or two, an' he'll weaken! You can't miss it,' says me ownliest; 'it's easy money.' “But d' little goil was awful leary of d' play. “' Washin'ton is so far away,' she says. “' It's like goin' to Harlem,' says me Rag. 'All youse has to do to go, is to take some sandwidges an' apples to sort o' jolly d' trip, an' then climb onto d' cars an' go. When d' Con. comes t'rough, pass him your pasteboard, see! an' if any of them smooth marks try to
  • 46. make a mash, t'run 'em down an' t'run 'em hard. I'll go over an' do your stunt at d' laundry, so that needn't give youse a scare. An' be d' way! if that lobster I win from d' other day shows up, I'll make a monkey of him ag'in. I didn't spend enough time wit' him on d' occasion of our mix-up, anyway.' “At last d' little laundry goil makes d' brace of her life. She's so bashful an' timid she can't live; but she's dead stuck on seein' her Billy before he sails away, an' it gives her nerve. As I says, she takes me Rag's steer an' skins out for d' Cap'tal. “An' what do youse t'ink? D' old mut who's Sec'tary won't chin wit' her. Toins her down cold, he does; gives her d' grand rinky-dink wit'out so much as findin' out what's her racket at all. “At d' finish, however, d' little goil lands one of d' push—he's a cloik in d' office, I figgers—an' he hears her yarn between weeps, an' ups an' makes a pass or two, an' she gets d' writin'. It says to toin Billy loose every afternoon till d' boat pulls out. “Say! him an 'd' little goil, when she gets back, was as happy as a couple of kids; dey has more fun than a box of monkeys. On d' level! I was proud of me Rag for floor managin' d' play. She wasn't solid wit' Billy an 'd' little goil! Oh, no! “That's how me an' me loidy was in on this weddin' to-day wit' bot' trilbys. Me Rag's 'It' wit' d' little goil; youse can gamble on that! “Of course d' war's over now, an' two weeks ago d' little goil's Billy comes home. An' what wit' pay, an' what wit' prize money, he hits d' Bend wit' a bundle of d' long green big enough to make youse t'row a fit, an' he ain't done a t'ing but boin money ever since. “Nit; it ain't much of a story, but d' whole racket pleases me out o' sight, see! Considerin' d' hand me Rag plays, when I'm at that weddin' to-day I feels like a daddy to Billy an 'd' little goil. On d' level! I feels that chesty about it, that when d' priest is goin' to bat an says, 'Is there any duck here to give d' bride away?' I cuts in on d' game wit 'd' remark, 'I donates d' bride meself.' I s'pose I was struck dopey, or nutty, or somethin'.
  • 47. “But me Rag fetches me to all c'rrect. She clinches her mit an' whispers: “Let me catch youse makin' another funny break like that an' I'll cop a sneak on your neck.' An' then she stands there chewin' d' quiet rag an' pipin' me off wit' an eye of fire. 'Such an old bum as youse,' she says, 'is a disgrace to d' Bend.'”
  • 48. T POINSETTE'S CAPTIVITY his is a tale of last August. Poinsette was to be left alone for four weeks. Mrs. Poinsette had settled on Cape May as a good thing for the hot spell. She would hie her thither and leave Poinsette to do his worst without her. Poinsette did not care. He bravely told Mrs. P. she needed an outing. The ozone and the salty, ocean breeze would do her good. So he encouraged Cape May, and bid Mrs. P. go there by all means. It was decided by the Poinsettes discussing Cape May to have Poinsette room up town while Mrs. P. was thus Cape Maying. The Poinsette house in the suburbs might better be locked up during Mrs. P.'s absence from the city. It would be more economical; indeed, it was not esteemed safe to leave the Poinsette lares and penates to the unwatched ministrations of the Congo who performed in the Poinsette kitchen. It would be wiser to dismiss the servant, bolt and bar the house, obtain Poinsette apartments, and let him browse for food among the bounteous restaurants of the city. Poinsette found a room to suit in a house on West 87th Street. It was one of a long row of houses. Poinsette reported his victory in room-hunting to Mrs. P. Poinsette was now all right, and ready for what might come. Mrs. P. might bend her course to Cape May without further hesitation. Mrs. P. was glad to learn of Poinsette's apartment success. She went out and looked at his find to make sure that Poinsette would be comfortable. Incidentally, Mrs. P. kept her eye about her, to note whether the boarding-house books carried any pretty girls. Mrs. P. did not care to have Poinsette too comfortable. There were no pretty girls. Mrs. P. approved the selection. The very next day she kissed Poinsette good-bye and rumbled and
  • 49. ferried to the station, from which arena of smoke and noise a train leaped forth like a greyhound and bore her away to Cape May. Poinsette did not accompany his spouse to the station. Ten years before he would have done this, but experience had taught him that Mrs. P. could care for herself. Therefore he remained behind to fasten up the house. Soberly he went about locking doors, and fastening windows, and thinking rather sadly,—as all husbands so deserted do,—of the long, lonely months before him. At last all was secure, and Poinsette turned the key in the big front door and came away. Poinsette did not feel like work that afternoon, or the trifling fragment of it that was left after Mrs. P. had wended and he had locked up the house. He bought a few good books and several of the more solid periodicals. They would serve during the weary nights while Mrs. P. was away at the Cape. These Poinsette sent to his rooms, and, as it was growing six o'clock now, he turned into Sherry's for his dinner. Just where Poinsette went that evening following Sherry's, and what he saw and did, and who assisted at such enterprises as he embarked in, would be nothing to the present point and may be skipped. They are the private affairs of Poinsette, and not properly the subjects of a morbid curiosity. However, lest Mrs. P. see this and argue aught herefrom to feed distrust, it should be said that Poinsette saw nobody, did nothing, went no place unbecoming an officer and a gentleman. It was four o'clock in the morning when Poinsette, the sole passenger aboard a foaming night-liner, toiled through the Park and bore away for his new abode. Poinsette stopped the faithful night- liner two blocks from the door and went forward on foot. Poinsette did not care to clatter ostentatiously to his rooms at four in the morning the first day he inhabited them. Poinsette found the house without trouble, and stepped lightly to the door. He put the pass-key his landlady had bestowed upon him in the lock, but it would not turn. The bolt would not yield to his
  • 50. wooing. Do all he might, and work he never so wisely, there had sprung up a misunderstanding between key and lock which would not be reconciled. Poinsette could not get “action;” the sullen door still barred him from his bed. At last Poinsette gave up in despair. He might ring the bell and arouse the house; but he hesitated. It was his first day; the hour needed apology. Poinsette thought it would be better to walk gently to a hotel and abide for the remainder of the night. He would solve this incompatibility of key and lock the next afternoon. Poinsette turned away and started softly for the street. As he did so a policeman stepped from behind a tree and stopped him. The policeman had been watching Poinsette for five minutes. “Wot was you a-doin' at the door?” he asked. Poinsette, in a low, hurried voice, explained. He didn't care to awaken his landlady by a tumult of talk, and have that excellent woman discover him in the hands of the law. “If your key don't work,” said the policeman, “why don't you ring the bell?” Poinsette cleared up that mystery. The officer was not satisfied. “To be free with you, my man,” he said, seizing Poinsette's collar, “I think you're a burglar. If that's your boarding-house you're goin' in. If it isn't, you're goin' to the station.” Then the policeman, with one hand wound about in Poinsette's neckwear, made trial of the key with the other hand. The effort was futile. The lock was obdurate; the key was stranger to it. Then the blue guardian of the city's slumbers stepped back a pace and took a mighty pull at the door-bell. It was a yank which brought forth a wealth of jingle and ring. Poinsette was glad of it. He had grown desperate and wanted the thing to end. Bad as it was, it would be better to face his landlady than be locked up in a burglar's cell. Poinsette was resigned, therefore, when a second-story window lifted and a night-capped head was made to overhang the sill and blot its silhouette against the star-lit sky.
  • 51. “Be you the landlady?” asked the policeman. “Yes, I am!” quoth the night-cap in a snappy, snarly way. “What do you want?” This with added sourness. “This party says his name is Poinsette and that he rooms here,” replied the officer. “No such thing!” retorted the night-cap. “No such man rooms here. Don't even know the name!” Then the window came down with a grievous bang. It was as if it descended on Poinsette's heart. “You're a crook!” said the policeman, “and now you come with me.” Poinsette essayed to explain that the night-cap was not his landlady; that he had made a mistake in the house. The policeman laughed in hoarse scorn at this. “D'ye think I'm goin' all along the row, yankin' door-bells out by the roots on such a stiff as you're givin' me?” That was the reply of the policeman to Poinsette's pleadings to try next door. Poinsette was led sadly off, with the grip of the law on his collar. At the station he was searched and booked and bolted in. On the hard plank, which made the sole furnishings of his narrow cell, Poinsette threw himself down; not to sleep, but to give himself to bitter consideration of his fate. As Poinsette sat there waiting for the sun to rise and friends to come to his rescue, the station clock struck five. It rang dismally in the cell of Poinsette. At Cape May, clocks of correct habits were also telling the hour of five. Mrs. P. was not yet asleep. The vigorous aroma of the ocean swept the room. The half-morning was beautiful; Mrs. P., loosely garbed, sat in an easy-chair at the window and enjoyed it. “I wonder what Poinsette's been doing,” said Mrs. P. to herself; and there was a colour of jealousy in the tone. Then Mrs. P. snorted as in contempt. “I'll warrant he's been having a good time,” she
  • 52. continued. “This idea that married men when their wives are away for the summer have a dull time, never imposed on me.”
  • 53. TIP FROM THE TOMB
  • 54. T CHAPTER I . Jefferson Bender was a doctor; that is, he was not a real, legal doctor as yet, but he was a hard student, and looked hopefully toward a day when, in accordance with the statutes in such cases made and provided, he would be cantered through the examination chute, and entitled to write “M. D.” following his name, with all that it implied. Each morning T. Jefferson Bender arose with the lark, and, seizing his dissecting knife, plunged into whatever subject was spread before him. In the afternoon he attended lectures, bending a hungry ear and watching with eager eye, while the lecturer, in illustration of his remarks, tortured poor people, free of charge. At night, when the day's carvings, and listenings, and lookings were over, T. Jefferson Bender sat in his easy chair and peered down the long aisle of coming time. The world was bright to the glance of T. Jefferson Bender; the future full of promise. In his musings he saw himself striding towards surgical fame and riches over a pathway strewn with the amputational harvest of his skill. He filled the hereafter with himself routing disease; cutting down deadly maladies as a farmer might the mullein-stalk; driving before him bacteria and bacilli in herds, droves, schools and shoals. T. Jefferson Bender was a happy man, and his forehead was already, in his imaginings, kissed by the rays of a dawning professional prosperity.
  • 55. T CHAPTER II . Jefferson Bender allowed himself but one relaxation. He was from Lexington, and had a true Kentuckian's love for horseflesh. Thus it was that he patronised the races, and was often seen at Morris Park, where he prevailed from a seat in the grand-stand. Here, casting off professional dignity as he might a garment, T. Jefferson Bender whooped and howled and hurled his hat on high, as race following race swept in. At intervals T. Jefferson Bender was carried to such heights of madness as “playing the horses.” And then it was he suffered those vicissitudes which are chronicled colloquially under the phrase of “getting it in the neck.”
  • 56. I CHAPTER III t was the day of the great race. The Morris Park grand-stand was reeling full. The quarter stretch was crowded with Democrats and Republicans and Mugwumps, who, laying aside political hatreds for a day, had come to see the races. The horses were backing and plunging in the grasp of rubbers and stable minions, while the gay jockeys, with their mites of saddles on their left arms, were being weighed in. Suddenly, a cry of terror rent the air. Otero, a headstrong beauty, had leaped upon the neck of Paddy the Pig, a horse rubber, and borne him to the earth. Paddy the Pig's neck was severely wrenched, so the crowd said. As the accident occurred, the victim fainted. “Is there a doctor present?” shouted one of the race judges, appealing to the grand-stand. T. Jefferson Bender arose from where he sat, walked over seventeen men and women, and leaped upon the stretch. “I am here,” observed T. Jefferson Bender, while his eye lighted and his nostrils expanded with the ardour of a great resolve. T. Jefferson Bender bent above Paddy the Pig and felt his pulse. “He lives!” muttered T. Jefferson Bender. Then he called for whiskey. At the magical words, Paddy the Pig languidly opened his eyes, while a flush dimly painted his cheek. “Doc, you have saved my life!” said Paddy the Pig. “I have,” said T. Jefferson Bender, willing to be impressive. “I have saved your life.” “Doc,” said Paddy the Pig in a weak, fluttering voice, “I am only a horse rubber, but I will make you rich. Play Skylight to win, Doc; Skylight! It's a tip from the tomb!”
  • 57. “It's a tip from the tomb!” said T. Jefferson Bender reverently, “what are the odds?” “It's a 20-to-1 shot, Doc. Play it. You will thus be paid for what you've done for me.”
  • 58. T CHAPTER IV hat night T. Jefferson Bender stood in a pawnshop. The flickering gaslight shone on mandolins, pistols, watches, and clothing, which had suffered the ordeal of the spout. T. Jefferson Bender was dusty and footsore. He had walked from Morris Park, and was now about to pawn his watch for food.
  • 60. Welcome to our website – the ideal destination for book lovers and knowledge seekers. With a mission to inspire endlessly, we offer a vast collection of books, ranging from classic literary works to specialized publications, self-development books, and children's literature. Each book is a new journey of discovery, expanding knowledge and enriching the soul of the reade Our website is not just a platform for buying books, but a bridge connecting readers to the timeless values of culture and wisdom. With an elegant, user-friendly interface and an intelligent search system, we are committed to providing a quick and convenient shopping experience. Additionally, our special promotions and home delivery services ensure that you save time and fully enjoy the joy of reading. Let us accompany you on the journey of exploring knowledge and personal growth! ebookultra.com