Key Schedule (Sub-Keys Generation) Algorithm
This section describes the Blowfish Key Schedule (Sub-Keys Generation) algorithm. It uses the binary representation of the fractional portion of constant Pi - 3.1415927... as initial values. 2016-03-17, 922👍, 2💬
Viewing Components of RSA Keys
This section provides a tutorial example on how to view different components of a pair of RSA private key and public key using the OpenSSL command line tool. 2016-03-14, 1306👍, 2💬
Viewing Components of Certificate Signing Request
This section provides a tutorial example on how to view different components of a CSR (Certificate Signing Request) for your public key with OpenSSL. 2016-03-14, 494👍, 3💬
Key Pair Sample Program - JcaKeyPair.java
This section provides a tutorial example on how to write simple program to generate a pair of private key and public key for the RSA or DSA algorithm. 2016-03-01, 672👍, 1💬
RSA Implementation using java.math.BigInteger Class
This chapter provides tutorial notes and example codes on RSA implementation using Java BigInteger class. Topics include introduction of the java.math.BigInteger class; generating large probable prime numbers; generating RSA public key and private key; validating RSA keys; determining cleartext and ... 2016-02-29, 2290👍, 3💬
Steps of Using DES Algorithm in JDK JCE
This section describes how to use DES algorithm provided in the JDK JCE package. Steps include building a secret key object from key material; creating and initializing a cipher object. 2016-01-24, 603👍, 1💬
What is ECB (Electronic CodeBook) Operation Mode?
This section describes what is ECB (Electronic CodeBook) Operation Mode - each plaintext block is encrypted independently without any input from other blocks. 2016-01-10, 2141👍, 2💬
Introduction to AES (Advanced Encryption Standard)
Tutorial notes and example codes on AES algorithms. Topics include introduction of AES (Advanced Encryption Standard); AES encryption algorithm; AES key schedule (round keys) algorithm and illustration example; MixColumns procedure algorithm; AES decryption algorithms. 2015-11-27, 239👍, 1💬
What is OFB (Output FeedBack) Operation Mode?
This section describes what is OFB (Output FeedBack) Operation Mode - each plaintext block is XORed with the current output block to be the ciphertext block. The current output block is the encrypted version of the previous output block. 2015-11-13, 1194👍, 2💬
Converting Secret Keys to and from Byte Arrays
This section provides a quick introduction of the SecretKeySpec class and the KeySpec interface. They can be used to convert secret keys into byte arrays to store them in external files. 2015-11-03, 4946👍, 1💬
DES Key Schedule Algorithm Illustration Program Output
This section provides the execution output of the tutorial Java program, DESSubkeysTest.java, to illustrate how DES key schedule algorithm works. 2015-08-09, 1522👍, 1💬
Subkeys of 3DES Encryption
Hi Doc, I have subkeys recovered through DPA. Can 3DES.c be modified to accept these subkeys as inputs for a cryptographic operation? Alternatively, can the main 3DES key be reverse generated from the subkeys? Thanks. firstname.lastname@example.org 2015-07-23, 1658👍, 1💬
This section provides a tutorial example on how to install and configure the PHP OpenSSL module on W...
This section describes steps of the compilation and execution process of C programs: preprocessing, ...
This section provides a tutorial example on how to perform validation of a certificate path with the...
This chapter provides tutorial notes on using the JDBC-ODBC Bridge driver with MS Access database. T...
This section provides a tutorial example on how to download and install Apache Tomcat 7 on a Windows...