<< < 1 2 3 4 5 6 7 8 9 > >>   ∑:342  Sort:Date

PKCS#8/X.509 Private/Public Encoding Standards
This chapter provides tutorial notes and example codes on PKCS#8 and X.509 key encoding standards. Topics include PKCS#8 standard for private key encoding; X.509 standard for public key encoding; PKCS8EncodedKeySpec and X509EncodedKeySpec classes to decode encoded keys; JcaKeyFactoryTest.java test p...
2021-11-22, 1382🔥, 1💬

DESCipherTest.java - DES Cipher Algorithm Illustration
This section provides a tutorial Java program, DESCipherTest.java, to illustrate how DES cipher algorithm works.
2016-01-24, 1315🔥, 1💬

💬 2016-01-24 Joe: Output

AES Standard Decryption Algorithm
The standard decryption algorithm of the AES-128 encryption is provided. It is a straightforward reverse of the encryption algorithm.
2021-04-25, 1272🔥, 1💬

Viewing Certificate Path
This section provides a tutorial example on how to view certificate path when visiting an 'https' Web site in IE. The top certificate in a certificate path is the CA certificate, which is trusted automatically.
2017-01-31, 1259🔥, 1💬

💬 2017-01-31 kishor: -----BEGIN CERTIFICATE----- MIIDqjCCApICCQC6MOh9nHUvUjANBgkqhkiG 9w0BAQUFADCBljELMAkGA1UEBhMCVVMxETAPBgNVBAgTCENvbG9yYWRvMRMwEQY. ..

Example Vector of AES Encryption
An example vector of AES-128 encryption is presented. Round keys and state values of all 11 rounds are included to help users to verify their AES implementation.
2019-02-24, 1239🔥, 1💬

tinyec - Python Library for ECC
This chapter provides tutorial notes on 'tinyec' Python library for ECC. Topics include installing 'tinyec'; creating ec.Curve objects, performing point addition and scalar multiplication.
2023-07-05, 1219🔥, 4💬

💬 2022-05-16 maria: hola mi mundo bonito

EC Private and Public Key Pair
This section introduces what is EC (Elliptic Curve) key pair - a pair of private key and public key constructed from a given subgroup generator in a given elliptic curve group.
2022-07-11, 1215🔥, 2💬

💬 2022-07-10 ALIANY: IAJM PROGRAMER

💬 2020-11-07 abc: Ravana

Cleartext Block Size for RSA Encryption
This section discusses what is the most efficient block size when dividing a Cleartext message into blocks for RSA public encryption. The suggested block size is 'floor((x-1)/8)', where 'x' is the RSA key size, or the key modulus bit length.
2022-03-29, 1178🔥, 3💬

💬 2022-03-29 asdasd: I hate it enough to like it. That being said, as we discussed before probably have a look at the difficulty rating of this vs th...

💬 2021-08-18 test: Obviously, using 200-bytes as the block size is much more efficient than 1-byte block size. This means the higher block size, th...

MD5 Mesasge Digest Algorithm
This chapter provides tutorial notes and example codes on the MD5 message digest algorithm. Topics include MD5 algorithm overview; using MD5 in Java, PHP, and Perl.
2017-09-10, 1157🔥, 2💬

💬 2016-05-19 ishvar: hello ahemad

Certificate X.509 Standard and DER/PEM Formats
This chapter provides tutorial notes and example codes on certificate content standard and file formats. Topics include X.509 standard for certificate content; DER encoding for certificate binary file format; PEM encoding for certificate text file format; exchanging certificates in DER and PEM forma...
2023-09-26, 1150🔥, 2💬

EC (Elliptic Curve) Key Pair
This chapter provides tutorial notes on EC (Elliptic Curve) key pair. Topics include definition of EC private and public key pair; example of elliptic curve and subgroup used to generate good EC key pair; using OpenSSL command line tool to generate EC key pairs.
2023-03-23, 1100🔥, 1💬

DES Encryption Operation Modes
This chapter provides tutorial examples and notes about DES encryption operation modes. Topics include how different blocks of plaintext can be coupled together to improve the strength of the DES encryption algorithm; ECB (Electronic CodeBook), CBC (Cipher Block Chaining), CFB (Cipher FeedBack), and...
2016-11-12, 1053🔥, 1💬

💬 2016-11-12 kazim: very good webpage

Blowfish Cipher Algorithm
This section describes the Blowfish cipher algorithm - A 16-round Feistel cipher with block size of 64 bits developed by Bruce Schneier in 1993.
2016-08-03, 1042🔥, 2💬

💬 2016-08-03 azi: fantastic

Steps of Using DES Algorithm in JDK JCE
This section describes how to use DES algorithm provided in the JDK JCE package. Steps include building a secret key object from key material; creating and initializing a cipher object.
2016-01-24, 989🔥, 1💬

💬 2016-01-24 Joe: Very nice

Introduction to AES (Advanced Encryption Standard)
Tutorial notes and example codes on AES algorithms. Topics include introduction of AES (Advanced Encryption Standard); AES encryption algorithm; AES key schedule (round keys) algorithm and illustration example; MixColumns procedure algorithm; AES decryption algorithms.
2015-11-27, 939🔥, 1💬

Elliptic Curve Point Addition Example
This section provides algebraic calculation example of adding two distinct points on an elliptic curve.
2022-10-01, 889🔥, 0💬

Blowfish - 8-Byte Block Cipher
This chapter provides tutorial examples and notes about Blowfish block cipher. Topics include Blowfish encryption and decryption algorithm; Blowfish sub-key generation schema, Blowfish algorithm implementation in Java.
2023-10-24, 884🔥, 4💬

💬 2023-10-24 test: 018a35f5-eed3-7a43-99d2-a6a22956bab7

💬 2022-06-21 sad: hello world

💬 2019-12-16 gio: i love you

What Is PEM (Privacy Enhanced Mail) Encoding?
This section describes the PEM (Privacy Enhanced Mail) Encoding - An encoding schema defined in RFC 1421-1424, 1993, specification to encode an email with encryptions into a text message of printable characters.
2022-01-19, 879🔥, 2💬

💬 2022-01-16 Herong: itef.org has changed their protocol to HTTPS. I will update their links in next revision. Thanks.

💬 2022-01-15 B: Links to RFC 1421, 1422, 1423, 1424 are all 404

"secp256k1" - For 256-Bit ECC Keys
This section describes 'secp256k1' elliptic curve domain parameters for generating 256-Bit ECC Keys as specified by secg.org.
2022-10-01, 865🔥, 0💬

"keytool" Importing CA's Own Certificate
This section provides a tutorial example on how to import CA's certificate generated by 'OpenSSL' into a 'keystore' file using 'keytool'
2016-10-20, 860🔥, 2💬

💬 2016-10-20 Herong: Akhtar, AES256 encryption does not require any certificates. It requires a secret AES key, see Introduction to AES (Advanced Enc...

💬 2016-10-19 Akhtar: I have also a certificate file (.cer) .I did the same procedure to import in to mykey store and got .jks file but, now i want to...

java.security.KeyFactory - Reading Encoded Keys
This section describes the java.security.KeyFactory class, which allows you to convert key spec objects back to key objects. Full process of reading and converting encoded key files back to key objects are also provided.
2019-03-23, 854🔥, 2💬

💬 2019-03-23 Herong: See the next tutorial " JcaKeyFactoryTest.java - Key Factory Test Program " for code samples.

💬 2019-03-13 wubba lubba dub dub: code samples along with this would've been helpful

RsaKeyValidator.java for RSA Key Validation
This section provides a tutorial example on how to validate RSA keys by encrypting and decrypting some random sample messages.
2023-02-19, 845🔥, 2💬

💬 2023-02-19 test: hello i m

Viewing Components of Certificate Signing Request
This section provides a tutorial example on how to view different components of a CSR (Certificate Signing Request) for your public key with OpenSSL.
2023-12-17, 829🔥, 5💬

💬 2023-12-17 Herong: NB, Thanks for your comments. I see the value of signing the CSR now and will update the book accordingly.

💬 2023-12-15 NB: Your CSR does not contain your private key. It contains your public key and information about the domain(s) for which it should ...

💬 2014-03-29 Herong: Hi Mike, Sorry for the inconvenience. HTML tags are supported, but they are limited to admin users only to reduce spamming and h...

💬 2014-03-23 Mike: Wow. What a waste of time trying to make a legible comment post. No instructions on how to get a paragraph break, include a angl...

💬 2014-03-23 Mike: You made a note in "Viewing Components of Certificate Signing Request" where you said, "The request is signed with my private ke...

Visiting an "https" Web Site with Chrome
This section describes how Google Chrome shows a lock icon when you visit an 'https' Web site to provide you more security related information.
2020-07-02, 823🔥, 2💬

💬 2020-07-02 Koshal Pravin jangale: Nice

<< < 1 2 3 4 5 6 7 8 9 > >>   ∑:342  Sort:Date