Cryptography Tutorials - Herong's Tutorial Examples - Version 5.36, by Dr. Herong Yang
About This Book
This section provides some detailed information about this book - Cryptography Tutorials - Herong's Tutorial Examples.
Website URL: http://www.herongyang.com/Cryptography
Title: Cryptography Tutorials - Herong's Tutorial Examples
Author: Dr. Herong Yang
Version/Edition: Version 5.36, 2018
Number of pages in PDF format: 337
Short description: This cryptography tutorial book is a collection of notes and sample codes written by the author while he was learning cryptography technologies himself. Topics include AES, blowfish, certificate, cipher, decryption, DES, digest, encryption, keytool, MD5, OpenSSL, PEM, PKCS#8, PKCS#12, private key, public key, RSA, secret key, SHA1, SSL, X.509.
Long description: This cryptography tutorial book is a collection of notes and sample codes written by the author while he was learning cryptography technologies himself. Topics include AES, blowfish, CA, certificate, certification path, cipher, CSR, decryption, DER, DES, digest, encryption, Java, JCE, JDK, keytool, MD5, message, OpenSSL, PEM, PKCS#8, PKCS#12, private key, public key, RSA, secret key, self-signed certificate, SHA1, SSL, X.509. Key sections are: Basic Concepts - Cipher - - AES Algorithm - DES Algorithm Illustrated with Java Programs and Java Implementation - JDK/JCE - Cipher for Encryption and Decryption - Cipher - Blowfish Algorithm - 8366 Hex Digits of PI - Message Digest - MD5 Algorithm Overview - MD5 Implementation in Java, PHP, PerlMD - Message Digest - SHA1 Algorithm Overview - SHA1 Implementation in Java, PHP, Perl - RSA public key encryption algorithm and Java implementation - DSA (Digital Signature Algorithm) and Java implementation - What is OpenSSL? - Installing OpenSSL on Windows - Generating RSA Key Pairs - Viewing Components of RSA Keys - Encrypting RSA Keys - What is a certificate? - Generating Self-Signed Certificates - Viewing Components of Certificates - Why Certificates Need to Be Signed by CAs? - Generating a Certificate Signing Request for Your Own Public Key - Viewing Components of Certificate Signing Request - Signing a Certificate Signing Request - keytool and Java keystore files - Certification Path Validation - Using Certificates in Web Browsers. - Certificate Format X.509, DER and PEM - Private Key Format PKCS#8 - Private Key and Certificate File Format PKCS#12
Keywords: Cryptography, Encryption, Tutorial, Example, Code.
The Web version of this book has been viewed a total of:
Table of Contents