Ethereum Tutorials - Herong's Tutorial Notes
This free book is a collection of tutorials and notes on Ethereum and blockchain. Topics include Blockchain, Ethereum, Cryptocurrency, Mining, MetaMask, Wallet. 2018-03-11, 244👍, 1💬
Viewing Components of Certificate Signing Request
This section provides a tutorial example on how to view different components of a CSR (Certificate Signing Request) for your public key with OpenSSL. 2016-03-14, 515👍, 3💬
Viewing Certificate Path
This section provides a tutorial example on how to view certificate path when visiting an 'https' Web site in IE 9. The top certificate in a certificate path is the CA certificate, which is trusted automatically. 2017-01-31, 477👍, 1💬
How Secure Is RSA Algorithm?
This section discusses the security of RSA public key encryption algorithm. RSA private key is not 100% secure. But if the private key uses larger value of n = p*q, it will take a very long time to crack the private key. 2017-11-10, 403👍, 2💬
DES Decryption Algorithm
This section describes DES decryption algorithm - identical to the encryption algorithm step by step in the same order, only with the subkeys applied in the reverse order. 2018-01-20, 356👍, 2💬
DES Encryption Operation Modes
This chapter provides tutorial examples and notes about DES encryption operation modes. Topics include how different blocks of plaintext can be coupled together to improve the strength of the DES encryption algorithm; ECB (Electronic CodeBook), CBC (Cipher Block Chaining), CFB (Cipher FeedBack), and... 2016-11-12, 351👍, 1💬
"OpenSSL" Generating CA's Private Key
This section provides a tutorial example on how to use OpenSSL to generate a RSA private key of 2048 bit long with OpenSSL. This key will be used as the CA's private key and must stored securely in a file with password protection. 2018-02-03, 304👍, 1💬
Visiting a "https" Web Site with Chrome
This section describes how Google Chrome 24 shows a lock icon when you visit an 'https' Web site to provide you more security related information. 2017-05-10, 277👍, 1💬
What Is Block Cipher?
This section describes what is block cipher - An encryption scheme in which 'the clear text is broken up into blocks of fixed length, and encrypted one block at a time'. 2016-09-26, 263👍, 1💬
"openssl enc" Converting Keys from Binary to PEM
This section provides a tutorial example on how to convert a private and public key pair stored in binary PKCS#8 format into PEM (Privacy Enhanced Mail) format with the 'openssl enc' command. 2018-01-20, 255👍, 2💬
Introduction to AES (Advanced Encryption Standard)
Tutorial notes and example codes on AES algorithms. Topics include introduction of AES (Advanced Encryption Standard); AES encryption algorithm; AES key schedule (round keys) algorithm and illustration example; MixColumns procedure algorithm; AES decryption algorithms. 2015-11-27, 241👍, 1💬
Introduction to DES Algorithm
This chapter provides tutorial examples and notes about DES (Data Encryption Standard) algorithm. Topics include description of block cipher, DES encryption algorithm, Round Keys Generation, DES decryption algorithm. 2018-01-22, 149👍, 2💬
Using MD5 Message Digest in Java
This section provides a tutorial example on how to use MD5 message digest algorithm in Java. The JDK JCE package offers the MD5 algorithm through a generic message digest class, javax.security.MessageDigest. 2017-01-27, 137👍, 2💬
Certificate X.509 Standard and DER/PEM Formats
This chapter provides tutorial notes and example codes on certificate content standard and file formats. Topics include X.509 standard for certificate content; DER encoding for certificate binary file format; PEM encoding for certificate text file format; exchanging certificates in DER and PEM forma... 2016-04-10, 130👍, 1💬
RSA Public Key Encryption Algorithm
This section describes the RSA public key encryption algorithm. Generating public and private keys used in RSA encryption requires two large prime numbers. 2016-11-21, 120👍, 1💬
Summary - Migrating "keystore" Keys to "OpenSSL"
This section describes high level steps on how to migrate a private key generated in a JKS (Java KeyStore) file to an 'OpenSSL' key file. The key step is to convert a JKS file into a PKCS#12 file with 'keytool'. 2016-04-09, 102👍, 1💬
This section describes how to create tables with CLOB columns in Oracle server.
This section provides a tutorial example on how to perform XSLT (Extensible Stylesheet Language Tran...
This section provides a tutorial example on how to download the WSDL document from the Web service p...
This chapter provides tutorial notes on using the JDBC-ODBC Bridge driver with MS Access database. T...
This section provides a tutorial example on how to use 'OpenSSL' to view certificates in DER and PEM...