Cryptography Tutorials - Herong's Tutorial Examples
∟References
List of reference materials used in this book.
- EC Cryptography Tutorials - Herong's Tutorial Examples, Herong Yang,
herongyang.com/EC-Cryptography/
- Blowfish Cipher - Herong's Tutorial Examples, Herong Yang,
herongyang.com/Blowfish/
- Data Encodings - Herong's Tutorial Examples, Herong Yang,
herongyang.com/Encoding/
- Handbook of Applied Cryptography, A. Megezes, P. van Oorschot, and
S. Vanstone, CRC Press, 1996,
cacr.math.uwaterloo.ca/hac
- Announcing the ADVANCED ENCRYPTION STANDARD (AES), nist.gov, 2001
csrc.nist.gov/publications/fips/fips197/fips-197.pdf
- AES Proposal: Rijndae, Joan Daemen, Vincent Rijmen, 1999
csrc.nist.gov/archive/aes/rijndael/Rijndael-ammended.pdf
- Federal Information Processing Standards Publication 1981 Guidelines
for Implementing and Using the NBS Data Encryption Standard, 1981
itl.nist.gov/fipspubs/fip74.htm
- DES Modes of Operation, 1980
itl.nist.gov/fipspubs/fip81.htm
- The DES Algorithm Illustrated, J. Orlin Grabbe,
orlingrabbe.com/des.htm
- PKCS #5: Password-Based Encryption Standard, 1993, An RSA Laboratories Technical Note,
ftp://ftp.rsasecurity.com/pub/pkcs/doc/pkcs-5.doc
- Java Cryptography Architecture API Specification & Reference, 2004,
docs.oracle.com/javase/1.5.0/docs/guide/security/CryptoSpec.html
- SourceForge.net: mcrypt - Encryption command and library,
sourceforge.net/projects/mcrypt
- Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish),
Bruce Schneier, December 1993,
schneier.com/paper-blowfish-fse.html
- The Blowfish Algorithm,
Asian School of Cyber Laws,
asianlaws.org/infosec/library/algo/blowfish.pdf
- Encryption Using the Blowfish Algorithm,
Kevin Hackett, 1998,
ee.ualberta.ca/~elliott/ee552/studentAppNotes/1998f/blowfish_encryption
- Coder's Lagoon - Homepage of BlowfishJ, Markus Hahn,
come.to/hahn
- Primer on Public Key Encryption, MyCrypto.net,
mycrypto.net/encryption/encryption_public.html
- Public Key Encryption, Charlie Fletcher,
krellinst.org/UCES/archive/modules/charlie/pke/
- OpenSSL: The Open Source Toolkit for SSL/TLS, The OpenSSL Project,
openssl.org/
- PEM, Privacy Enhanced Mail,
networksorcery.com/enp/data/pem.htm
- RFC 1421 - Privacy Enhancement for Internet Electronic Mail:
Part I: Message Encryption and Authentication Procedures, February 1993,
faqs.org/rfcs/rfc1421.html
- RFC 3548 - The Base16, Base32, and Base64 Data Encodings, July 2003,
faqs.org/rfcs/rfc3548.html
- MD5 Homepage (unofficial),
userpages.umbc.edu/~mabzug1/cs/md5/md5.html
- RFC 1321 - The MD5 Message-Digest Algorithm, April 1992,
ietf.org/rfc/rfc1321.txt
- MD5 in 8 lines of perl5, John Allen,
cypherspace.org/adam/rsa/md5.html
- MD5, Wikipedia,
en.wikipedia.org/wiki/MD5
- Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD,
Xiaoyun Wang, Dengguo Feng, Xuejia Lai and Hongbo Yu,
eprint.iacr.org/2004/199
- FIPS PUB 180-1 - Secure Hash Algorithm, 1993 May 11,
www.itl.nist.gov/fipspubs/fip180-1.htm
- FIPS PUB 186-3 - Digital Signature Standard (DSS), 2009,
csrc.nist.gov/publications/fips/fips186-3/fips_186-3.pdf
- RFC 1321 - US Secure Hash Algorithm 1 (SHA1), September 2001
ietf.org/rfc/rfc3174.txt
- SHA in 8 lines of perl5, John Allen,
cypherspace.org/adam/rsa/sha.html
- SHA hash functions, Wikipedia,
en.wikipedia.org/wiki/SHA-1
- Collision Search Attacks on SHA1, Xiaoyun Wang. Yiqun Lisa Yin and Hongbo Yu,
theory.lcs.mit.edu/~yiqun/shanote.pdf
- PKCS #1: RSA Cryptography Standard, EMC,
rsa.com/rsalabs/node.asp?id=2125
- The RSA Algorithm, Evgeny Milanov,
math.washington.edu/~morrow/336_09/papers/Yevgeny.pdf
Table of Contents
About This Book
Cryptography Terminology
Cryptography Basic Concepts
Introduction to AES (Advanced Encryption Standard)
Introduction to DES Algorithm
DES Algorithm - Illustrated with Java Programs
DES Algorithm Java Implementation
DES Algorithm - Java Implementation in JDK JCE
DES Encryption Operation Modes
DES in Stream Cipher Modes
PHP Implementation of DES - mcrypt
Blowfish - 8-Byte Block Cipher
Secret Key Generation and Management
Cipher - Secret Key Encryption and Decryption
Introduction of RSA Algorithm
RSA Implementation using java.math.BigInteger Class
Introduction of DSA (Digital Signature Algorithm)
Java Default Implementation of DSA
Private key and Public Key Pair Generation
PKCS#8/X.509 Private/Public Encoding Standards
Cipher - Public Key Encryption and Decryption
MD5 Mesasge Digest Algorithm
SHA1 Mesasge Digest Algorithm
OpenSSL Introduction and Installation
OpenSSL Generating and Managing RSA Keys
OpenSSL Managing Certificates
OpenSSL Generating and Signing CSR
OpenSSL Validating Certificate Path
"keytool" and "keystore" from JDK
"OpenSSL" Signing CSR Generated by "keytool"
Migrating Keys from "keystore" to "OpenSSL" Key Files
Certificate X.509 Standard and DER/PEM Formats
Migrating Keys from "OpenSSL" Key Files to "keystore"
Using Certificates in IE
Using Certificates in Google Chrome
Using Certificates in Firefox
Archived Tutorials
►References
Full Version in PDF/EPUB