Popular Books:
Archived: Visiting "https" Web Site with Chrome 24
This section describes how Google Chrome 24 shows a lock icon when you visit an 'https' Web site to provide you more security related information. 2026-01-31, ∼173🔥, 1💬
"OpenSSL" Generating Certificates in DER and PEM
This section provides a tutorial example on how to generate certificates in DER and PEM formats using 'OpenSSL'. 2026-01-11, ≈15🔥, 5💬
Is EC Private Key Secure
This section discusses the question of: how secure is the EC (Elliptic Curve) key pair? Or how hard is it someone to figure out the private key from a given EC public key? 2025-09-06, ∼412🔥, 1💬
Importing CA Certificate into Firefox
This section provides a tutorial example on how to import a CA certificate into Firefox in the 'Authorities' category. 2025-06-18, ∼636🔥, 1💬
First 8336 Hex Digits of PI
This section provides first 8336 hex digits of constant PI, 3.1415927..., needed for Blowfish encryption algorithm. 2025-04-28, ∼8338🔥, 13💬
💬 2019-04-28 Herong: 8336 Hex Digits. Thanks.
💬 2019-04-26 Harry: Do you mean 8336 digits
💬 2024-04-23 ☺: meaningful comments. Thanks! ☺
💬 2022-12-02 Victor: meaningful comments.
Full Version in PDF/EPUB
Information on how to obtain the full version of this book in PDF, EPUB, or other format. 2024-03-13, ∼9328🔥, 37💬
💬 2018-10-20 Herong: bachi, thanks for sharing your comment.
💬 2018-10-13 bachi: I like how you composed your content. I like how you explain the DES algorithm
What Is PKCS5Padding?
This section describes what is PKCS5Padding - a schema to pad cleartext to be multiples of 8-byte blocks. 2024-01-31, ≈50🔥, 38💬
💬 2023-04-12 {"partnerReferenceNo": "APP12345: ok
💬 2023-01-18 Servant of Elon Musk's Regent: You are the chosen one!
💬 2022-11-17 Elon Musk's Regent: mommy
💬 2022-11-14 Elon Musk: Giving away twitter to the first person to reply and call me mommy
What is ECB (Electronic CodeBook) Operation Mode?
This section describes what is ECB (Electronic CodeBook) Operation Mode - each plaintext block is encrypted independently without any input from other blocks. 2024-01-29, ∼5883🔥, 5💬
💬 2020-10-18 Herong: donjo, there is no real applications that use the ECB mode.
💬 2020-10-16 donjo dumdum: What is application of ECB mode operation
Viewing Components of Certificate Signing Request
This section provides a tutorial example on how to view different components of a CSR (Certificate Signing Request) for your public key with OpenSSL. 2023-12-17, ∼894🔥, 5💬
Encrypting RSA Keys
This section provides a tutorial example on how to store RSA keys encrypted with password protection. 2023-12-12, ∼594🔥, 1💬
Full Version in PDF/EPUB
Information on how to obtain the full version of this book in PDF, EPUB, or other format. 2023-12-06, ∼679🔥, 2💬
Illustration of DSA Algorithm: p,q=23,11
This section provides a tutorial example to illustrate how DSA digital signature algorithm works with small prime modulus p=23 and prime divisor q=11. 2023-11-19, ∼6541🔥, 10💬
What Is ECDH Key Exchange
This section introduces what is ECDH Key Exchange - a protocol that uses the Elliptic Curve group property to establish a shared secret key without sending it directly to each other. 2023-11-09, ∼3390🔥, 3💬
"secp256r1" - For 256-Bit ECC Keys
This section describes 'secp256r1' elliptic curve domain parameters for generating 256-Bit ECC Keys as specified by secg.org. 2023-10-20, ∼5533🔥, 1💬
Popular Posts:
This section provides a tutorial example on how to export a list of trusted root CA certificates wit...
This section describes a tutorial on how to play DAT files directly with Windows Media Player.
This section provides first 8336 hex digits of constant PI, 3.1415927..., needed for Blowfish encryp...
新冠病毒感染过程有哪些阶段? 新冠病毒感染过程可以分成四个阶段:对接,融入,复 制,释放。下面是一张摘自bmj.com的新冠...
This section provides a tutorial example on how to download and install Microsoft Visual C# 2010 Exp...