Popular Books:
Is EC Private Key Secure
This section discusses the question of: how secure is the EC (Elliptic Curve) key pair? Or how hard is it someone to figure out the private key from a given EC public key? 2025-09-06, ∼395🔥, 1💬
Importing CA Certificate into Firefox
This section provides a tutorial example on how to import a CA certificate into Firefox in the 'Authorities' category. 2025-06-18, ∼601🔥, 1💬
First 8336 Hex Digits of PI
This section provides first 8336 hex digits of constant PI, 3.1415927..., needed for Blowfish encryption algorithm. 2025-04-28, ∼8281🔥, 13💬
💬 2019-04-28 Herong: 8336 Hex Digits. Thanks.
💬 2019-04-26 Harry: Do you mean 8336 digits
💬 2024-04-23 ☺: meaningful comments. Thanks! ☺
💬 2022-12-02 Victor: meaningful comments.
Full Version in PDF/EPUB
Information on how to obtain the full version of this book in PDF, EPUB, or other format. 2024-03-13, ∼9299🔥, 37💬
💬 2018-10-20 Herong: bachi, thanks for sharing your comment.
💬 2018-10-13 bachi: I like how you composed your content. I like how you explain the DES algorithm
What Is PKCS5Padding?
This section describes what is PKCS5Padding - a schema to pad cleartext to be multiples of 8-byte blocks. 2024-01-31, ≈50🔥, 38💬
💬 2023-04-12 {"partnerReferenceNo": "APP12345: ok
💬 2023-01-18 Servant of Elon Musk's Regent: You are the chosen one!
💬 2022-11-17 Elon Musk's Regent: mommy
💬 2022-11-14 Elon Musk: Giving away twitter to the first person to reply and call me mommy
What is ECB (Electronic CodeBook) Operation Mode?
This section describes what is ECB (Electronic CodeBook) Operation Mode - each plaintext block is encrypted independently without any input from other blocks. 2024-01-29, ∼5865🔥, 5💬
💬 2020-10-18 Herong: donjo, there is no real applications that use the ECB mode.
💬 2020-10-16 donjo dumdum: What is application of ECB mode operation
Viewing Components of Certificate Signing Request
This section provides a tutorial example on how to view different components of a CSR (Certificate Signing Request) for your public key with OpenSSL. 2023-12-17, ∼889🔥, 5💬
Encrypting RSA Keys
This section provides a tutorial example on how to store RSA keys encrypted with password protection. 2023-12-12, ∼571🔥, 1💬
Full Version in PDF/EPUB
Information on how to obtain the full version of this book in PDF, EPUB, or other format. 2023-12-06, ∼662🔥, 2💬
Illustration of DSA Algorithm: p,q=23,11
This section provides a tutorial example to illustrate how DSA digital signature algorithm works with small prime modulus p=23 and prime divisor q=11. 2023-11-19, ∼6516🔥, 10💬
What Is ECDH Key Exchange
This section introduces what is ECDH Key Exchange - a protocol that uses the Elliptic Curve group property to establish a shared secret key without sending it directly to each other. 2023-11-09, ∼3372🔥, 3💬
"secp256r1" - For 256-Bit ECC Keys
This section describes 'secp256r1' elliptic curve domain parameters for generating 256-Bit ECC Keys as specified by secg.org. 2023-10-20, ∼5425🔥, 1💬
RSA Public Key Encryption Algorithm
This section describes the RSA public key encryption algorithm. Generating public and private keys used in RSA encryption requires two large prime numbers. 2023-10-16, ∼382🔥, 2💬
💬 2023-10-16 subbarao: thanks for giving wonderful knowledge
Popular Posts:
This section describes how to calculate Double-SHA256 hash with Python.
This section provides descriptions on some commonly used cryptography terminologies
This book is a collection of notes and sample codes written by the author while he was learning C#. ...
Information on how to obtain the PDF version of this book, 'GB2312 Tutorials - Herong's Tutorial Exa...
This section describes 'secp256k1' elliptic curve domain parameters for generating 256-Bit ECC Keys ...