Tutorial Books:
CFB (Cipher FeedBack) as a Stream Cipher
This section describes how DES CFB (Cipher FeedBack) operation mode can be modified as a 1-bit stream cipher or a 1-byte stream cipher. 2022-03-10, 707🔥, 2💬
Abelian Group on Elliptic Curve
This section demonstrates that an Abelian Group can be defined with all points on an elliptic curve with the 'rule of chord' operation. 2022-03-02, 361🔥, 1💬
💬 2018-12-28 '">alert(2): '"><script>alert(1)</s cript>
💬 2017-09-29 Herong: I don't think it takes the length of bits. But I will double check it.
Blowfish Secret Key Encryption Tests
This section provides the test result of Blowfish secret key encryption and decryption using the javax.crypto.Cipher class. 2021-10-16, 326🔥, 1💬
💬 2017-06-17 Herong: Neil, I will try my best. Thanks for the comment.
💬 2017-06-14 Neil Shrestha-Birtch: It helped me! thanks for keeping this resource up.
What Is Cryptography?
This section describes what is cryptography - The study of techniques related to all aspects of data security. 2021-04-25, 3240🔥, 6💬
💬 2015-10-19 Ian T. Lee: Can you give me a simple example of how to do cryptography manually?
AES Standard Decryption Algorithm
The standard decryption algorithm of the AES-128 encryption is provided. It is a straightforward reverse of the encryption algorithm. 2021-04-25, 1300🔥, 1💬
What Is tinyec
This section introduces what is tinyec - a tiny library to perform arithmetic operations on elliptic curves in pure Python. 2021-03-02, 724🔥, 1💬
💬 2021-01-08 Herong: Abigail, you are welcome!
💬 2021-01-06 Abigail: Thank you so much, just what I needed for my university assignment!
💬 2020-12-05 Herong: Donghua, h is any integer you pick to help generating g.
💬 2020-12-04 Donghua: What's the h means in step three. How to calculate it?
Visiting an "https" Web Site with Chrome
This section describes how Google Chrome shows a lock icon when you visit an 'https' Web site to provide you more security related information. 2020-07-02, 836🔥, 2💬
About This Book
This section provides some detailed information about this book - __title__. 2020-06-23, 449🔥, 1💬
💬 2020-06-04 ben: How are you?
💬 2018-04-07 Submit Your Comment: Please write meaningful comments. Thanks! ☺
DES Decryption Algorithm
This section describes DES decryption algorithm - identical to the encryption algorithm step by step in the same order, only with the subkeys applied in the reverse order. 2020-05-19, 6491🔥, 4💬
💬 2020-05-19 Nick: test comment
💬 2019-06-17 bIPFaV0PLbO9qrDgn+p43A==: bIPFaV0PLbO9qrDgn+p43A==
💬 2017-12-16 Herong: deepak, is this a encrypted comment?
💬 2017-12-11 deepak: 9bc94bbaf6d380eb8f8c6548b2cf6343ccef 5978768e3d69b796d6ef0839172b
Popular Posts:
This section provides a tutorial example on how to install a trusted root certificate on Android pho...
This section describes the Blowfish Key Schedule (Sub-Keys Generation) algorithm. It uses the binary...
This section provides a tutorial example on how to write a simple Java test program to join any give...
This section describes how to calculate Double-SHA256 hash with Python.
This section provides a tutorial example on how to download and install Oracle JRockit 6 R28.2.7 on ...