Viewing Certificate Path
This section provides a tutorial example on how to view certificate path when visiting an 'https' Web site in IE 9. The top certificate in a certificate path is the CA certificate, which is trusted automatically. 2017-01-31, 427👍, 1💬
Using MD5 Message Digest in Java
This section provides a tutorial example on how to use MD5 message digest algorithm in Java. The JDK JCE package offers the MD5 algorithm through a generic message digest class, javax.security.MessageDigest. 2017-01-27, 137👍, 2💬
What is CFB (Cipher FeedBack) Operation Mode?
This section describes what is CFB (Cipher FeedBack) Operation Mode - each plaintext block is XORed with the encrypted version of the ciphertext of the previous block to be the ciphertext block. 2017-01-13, 1534👍, 3💬
RsaKeyGenerator.java for RSA Key Generation
This section describes the initial draft of a RSA public key and private key generation implementation using the java.math.BigInteger class. 2017-01-05, 1261👍, 2💬
MD5 Message Digest Algorithm Overview
This section describes the MD5 algorithm - a 5-step process of padding of '1000...', appending message length, dividing as 512-bit blocks, initializing 4 buffers, and 4-round of hashing each block. 2016-11-21, 6232👍, 6💬
RSA Public Key Encryption Algorithm
This section describes the RSA public key encryption algorithm. Generating public and private keys used in RSA encryption requires two large prime numbers. 2016-11-21, 120👍, 1💬
DES Encryption Operation Modes
This chapter provides tutorial examples and notes about DES encryption operation modes. Topics include how different blocks of plaintext can be coupled together to improve the strength of the DES encryption algorithm; ECB (Electronic CodeBook), CBC (Cipher Block Chaining), CFB (Cipher FeedBack), and... 2016-11-12, 318👍, 1💬
SHA1 Mesasge Digest Algorithm
This chapter provides tutorial notes and example codes on the SHA1 message digest algorithm. Topics include SHA1 algorithm overview; using SHA1 in Java, PHP, and Perl. 2016-11-05, 1283👍, 5💬
What Is Block Cipher?
This section describes what is block cipher - An encryption scheme in which 'the clear text is broken up into blocks of fixed length, and encrypted one block at a time'. 2016-09-26, 247👍, 1💬
"keytool" Exporting Certificates in DER and PEM
This section provides a tutorial example on how to export certificates in DER and PEM format using the 'keytool -exportcert' command. 2016-06-27, 15305👍, 2💬
Introduction to DES Algorithm
This chapter provides tutorial examples and notes about DES (Data Encryption Standard) algorithm. Topics include description of block cipher, DES encryption algorithm, Round Keys Generation, DES decryption algorithm. 2016-05-20, 113👍, 1💬
"openssl pkcs8" Converting Keys to PKCS#8 Format
This section provides a tutorial example on how to convert a private key file from the traditional format into PKCS#8 format using the 'openssl pkcs8' command. Keys can still be encoded with DER or PEM with or without DES encryption in PKCS#8 format. 2016-04-12, 4047👍, 1💬
Certificate X.509 Standard and DER/PEM Formats
This chapter provides tutorial notes and example codes on certificate content standard and file formats. Topics include X.509 standard for certificate content; DER encoding for certificate binary file format; PEM encoding for certificate text file format; exchanging certificates in DER and PEM forma... 2016-04-10, 130👍, 1💬
Summary - Migrating "keystore" Keys to "OpenSSL"
This section describes high level steps on how to migrate a private key generated in a JKS (Java KeyStore) file to an 'OpenSSL' key file. The key step is to convert a JKS file into a PKCS#12 file with 'keytool'. 2016-04-09, 102👍, 1💬
"keytool" Importing Certificates in DER and PEM
This section provides a tutorial example on how to use 'keytool' to import certificates in DER and PEM formats generated by 'OpenSSL' into 'keystore' files. 2016-04-01, 10470👍, 1💬
Certificate in PEM Format
This section describes what is certificate PEM (Privacy Enhanced Mail) format - A format uses PEM idea to convert a certificate in DER format to a message of printable characters. The conversion uses the Base64 encoding. 2016-03-30, 2677👍, 2💬
Illustration of DSA Algorithm: p,q=7,3
This section provides a tutorial example to illustrate how DSA digital signature algorithm works with small prime modulus p=7 and prime divisor q=3. 2016-03-22, 2121👍, 4💬
Key Schedule (Sub-Keys Generation) Algorithm
This section describes the Blowfish Key Schedule (Sub-Keys Generation) algorithm. It uses the binary representation of the fractional portion of constant Pi - 3.1415927... as initial values. 2016-03-17, 920👍, 2💬
This section provides a tutorial example on how to use 'keytool' to import certificates in DER and P...
This section provides a tutorial example on how to perform validation of a certificate path with the...
This section describes steps of the compilation and execution process of C programs: preprocessing, ...
This section provides a tutorial example on how to perform XSLT (Extensible Stylesheet Language Tran...
This section describes how to download and install Microsoft JDBC Driver 4.2 for SQL Server 2014.