1 2 3 4 5 6 > >>   ∑:342  Sort:Rank

Full Version in PDF/EPUB
Information on how to obtain the full version of this book in PDF, EPUB, or other format.
2024-03-13, 8991🔥, 37💬

💬 2024-03-13 aridj: thanks

💬 2021-07-27 attila: thanks

💬 2019-07-04 aladdin: thanks

💬 2018-10-20 Herong: bachi, thanks for sharing your comment.

💬 2018-10-13 bachi: I like how you composed your content. I like how you explain the DES algorithm

(More comments ...)

What Is PKCS5Padding?
This section describes what is PKCS5Padding - a schema to pad cleartext to be multiples of 8-byte blocks.
2024-01-31, 49325🔥, 38💬

💬 2023-11-02 ayyappa: enjoy

💬 2023-04-12 {"partnerReferenceNo": "APP12345: ok

💬 2023-01-18 Servant of Elon Musk's Regent: You are the chosen one!

💬 2022-11-17 Elon Musk's Regent: mommy

💬 2022-11-14 Elon Musk: Giving away twitter to the first person to reply and call me mommy

(More comments ...)

Blowfish Decryption Algorithm
This section describes the Blowfish decryption algorithm, which is identical to the encryption algorithm step by step in the same order, only with the sub-keys applied in the reverse order.
2024-01-29, 1383🔥, 3💬

What is ECB (Electronic CodeBook) Operation Mode?
This section describes what is ECB (Electronic CodeBook) Operation Mode - each plaintext block is encrypted independently without any input from other blocks.
2024-01-29, 5733🔥, 5💬

💬 2020-10-18 Herong: donjo, there is no real applications that use the ECB mode.

💬 2020-10-16 donjo dumdum: What is application of ECB mode operation

💬 2016-01-10 Todd: Thanks!

Certificate in PEM Format
This section describes what is certificate PEM (Privacy Enhanced Mail) format - A format uses PEM idea to convert a certificate in DER format to a message of printable characters. The conversion uses the Base64 encoding.
2023-12-22, 17177🔥, 8💬

💬 2023-11-13 shady: MIICUTCCAfugAwIBAgIBADANBgkqhkiG9w0B AQQFADBXMQswCQYDVQQGEwJDTjELMAkGA1UECBMCUE4xCzAJBgNVBAcTAkNOMQsw CQYDVQQKEwJPTjELMAkGA1UECxM...

💬 2023-10-16 subbarao: thanks

💬 2021-12-27 Azul: Why do you want me to write things like that?

💬 2020-02-23 Herong: Mark, if your certificate is signed by your own CA, put it on the Apache server together with the CA certificate to test. Other ...

💬 2020-02-17 mark scorfield: Hi i have a pem certificate x509 that i would like to share against my own certificate signing authority , what is the best way ...

(More comments ...)

Viewing Components of Certificate Signing Request
This section provides a tutorial example on how to view different components of a CSR (Certificate Signing Request) for your public key with OpenSSL.
2023-12-17, 828🔥, 5💬

💬 2023-12-17 Herong: NB, Thanks for your comments. I see the value of signing the CSR now and will update the book accordingly.

💬 2023-12-15 NB: Your CSR does not contain your private key. It contains your public key and information about the domain(s) for which it should ...

💬 2014-03-29 Herong: Hi Mike, Sorry for the inconvenience. HTML tags are supported, but they are limited to admin users only to reduce spamming and h...

💬 2014-03-23 Mike: Wow. What a waste of time trying to make a legible comment post. No instructions on how to get a paragraph break, include a angl...

💬 2014-03-23 Mike: You made a note in "Viewing Components of Certificate Signing Request" where you said, "The request is signed with my private ke...

Encrypting RSA Keys
This section provides a tutorial example on how to store RSA keys encrypted with password protection.
2023-12-12, 356🔥, 1💬

EC Cryptography Tutorials - Herong's Tutorial Examples
This EC (Elliptic Curve) cryptography tutorial book is a collection of notes and sample codes written by the author while he was learning cryptography technologies himself. Topics include rule of chord and point addition on elliptic curves; Abelian groups with additive/multiplicative notations; EC a...
2023-12-06, 5103🔥, 10💬

💬 2022-07-27 Aman: Perfect book to help my 'encoding' project. Thank you!

💬 2020-06-23 Herong: Chris, contact me by email. I will send you a PDF copy. Thanks for your comment.

💬 2020-06-22 chris: Sorry for fuss. Bought this ebook on google. bad idea. Should have not done that and just got the physical book or maybe ebook o...

💬 2019-01-01 Yale: Thank you!

Full Version in PDF/EPUB
Information on how to obtain the full version of this book in PDF, EPUB, or other format.
2023-12-06, 478🔥, 2💬

💬 2023-12-06 Herong: Devang, can you send me your order information to me at herong_yang@yahoo.com? Thanks.

💬 2023-12-05 Devang: I purchased the book from amazon a d sent the mail with order details but did not receive book in pdf format. Could you please c...

Illustration of DSA Algorithm: p,q=23,11
This section provides a tutorial example to illustrate how DSA digital signature algorithm works with small prime modulus p=23 and prime divisor q=11.
2023-11-19, 5757🔥, 10💬

💬 2023-02-23 CYR: Thanks for providing the detail example, it helps me to understand the algorithm a lot. The value for g looks like incorrect to ...

💬 2021-01-09 Flying Horse: Hello Dr Yang, My verification scheme is as follows lhs = (r**s mod p)mod q rhs = ((g**h mod p)*(y**r mod p)) mod q If lhs = rhs...

💬 2021-01-08 Herong: Flying, give us an example to show that this verification scheme is not working?

💬 2021-01-07 Flying Horse: Hello Dr Yang, this is a very helpful tutorial. I am trying a different verification scheme for DSA signature. Unfortunately, it...

💬 2020-06-22 Filip: Very helpful, thanks!

(More comments ...)

What Is PKCS#8?
This section describes what is PKCS#8 - One of the PKCS (Public Key Cryptography Standards) used to store a single private key. A PKCS#8 file can be encrypted with a password to protect the private key.
2023-11-15, 460🔥, 4💬

What Is ECDH Key Exchange
This section introduces what is ECDH Key Exchange - a protocol that uses the Elliptic Curve group property to establish a shared secret key without sending it directly to each other.
2023-11-09, 3038🔥, 3💬

💬 2021-11-08 Carol: Thanks

Blowfish - 8-Byte Block Cipher
This chapter provides tutorial examples and notes about Blowfish block cipher. Topics include Blowfish encryption and decryption algorithm; Blowfish sub-key generation schema, Blowfish algorithm implementation in Java.
2023-10-24, 882🔥, 4💬

💬 2023-10-24 test: 018a35f5-eed3-7a43-99d2-a6a22956bab7

💬 2022-06-21 sad: hello world

💬 2019-12-16 gio: i love you

"secp256r1" - For 256-Bit ECC Keys
This section describes 'secp256r1' elliptic curve domain parameters for generating 256-Bit ECC Keys as specified by secg.org.
2023-10-20, 3271🔥, 1💬

💬 2023-10-20 Duy: hello

RSA Public Key Encryption Algorithm
This section describes the RSA public key encryption algorithm. Generating public and private keys used in RSA encryption requires two large prime numbers.
2023-10-16, 297🔥, 2💬

💬 2023-10-16 subbarao: thanks for giving wonderful knowledge

Geometric Introduction to Elliptic Curves
This chapter provides a geometric introduction of elliptic curves and the associated addition operation. Topics includes what is an elliptic curve and its geometric properties; geometric algorithm defining an addition operation; infinity point or identity element; commutativity and associativity of ...
2023-10-11, 760🔥, 2💬

💬 2020-09-12 NA: NA

Certificate X.509 Standard and DER/PEM Formats
This chapter provides tutorial notes and example codes on certificate content standard and file formats. Topics include X.509 standard for certificate content; DER encoding for certificate binary file format; PEM encoding for certificate text file format; exchanging certificates in DER and PEM forma...
2023-09-26, 1147🔥, 2💬

EC Key in PEM File Format
This section provides a tutorial example on the EC key PEM file format. EC domain parameters are stored together with the private key.
2023-09-17, 3709🔥, 1💬

💬 2023-09-17 ecformat: this is to test EC format

Generate secp256k1 Keys with OpenSSL
This section provides a tutorial example on how to generate EC (Elliptic Curve) private and public key pairs using secp256k1 domain parameters.
2023-08-10, 3361🔥, 3💬

💬 2023-08-10 emanuel: thanks , it was realz helpfull. can zou tell me how can i encrzpt with btc key some message, because btc use the same secp256k1 ...

tinyec - Python Library for ECC
This chapter provides tutorial notes on 'tinyec' Python library for ECC. Topics include installing 'tinyec'; creating ec.Curve objects, performing point addition and scalar multiplication.
2023-07-05, 1206🔥, 4💬

💬 2022-05-16 maria: hola mi mundo bonito

DES Algorithm Java Implementation
This chapter provides tutorial examples and notes about DES algorithm implementation in Java language. Topics include an example Java implementation of DES encryption and decryption algorithm; test cases of single block cleartext and ciphertext.
2023-06-23, 8226🔥, 18💬

💬 2023-06-23 rafa: Hello my love

💬 2018-12-13 syed zia ur rehman: i realy like your link

💬 2017-10-15 Herong: CipherDES.java also works as a decryption program. Try it by running "java DesCipher decrypt keyFile input output".

💬 2017-10-09 aa: thanks, but where i can find DES decryption

💬 2017-10-09 Denys: thx

(More comments ...)

AES MixColumns() Procedure Algorithm
A detailed description of the MixColumns() procedure algorithm is provided. The MixColumns() procedure performs a matrix multiplication of a given 'state' with a static matrix. The MixColumns() procedure is used in the AES encryption process.
2023-06-10, 5529🔥, 3💬

💬 2021-12-24 Muhammad Ghulam Ghouse: Appreciated

💬 2021-11-15 123: AD E0 B8 1E BF B4 41 27 5D 52 11 98 30 AE F1 E5

Illustration of RSA Algorithm: p,q=5,7
This section provides a tutorial example to illustrate how RSA public key encryption algorithm works with 2 small prime numbers 5 and 7.
2023-06-08, 8842🔥, 11💬

💬 2022-12-11 Racheal mweemba: This was helpful

💬 2022-12-11 Racheal Mweemba: ❤️❤️❤️❤️

💬 2022-04-23 Shivam: Please provide the code for the same

💬 2021-12-23 x: 5

💬 2020-11-22 Herong: fab, as shown in the tutorial, the modulus is 35. The encryption key (public key) is 5, and the decryption key (private key) is ...

(More comments ...)

Key Schedule (Sub-Keys Generation) Algorithm
This section describes the Blowfish Key Schedule (Sub-Keys Generation) algorithm. It uses the binary representation of the fractional portion of constant Pi - 3.1415927... as initial values.
2023-06-05, 1734🔥, 3💬

💬 2023-06-05 Daniel: I don't understand how to assign key for plaintext

💬 2016-03-17 Herong: Hi Yogita, Blowfish(T) function refers the Blowfish algorithm described in the previous tutorial: Blowfish Cipher Algorithm .

💬 2016-03-16 YOGITA: what is the function blowfish(T) here? Send the pseudo code

1 2 3 4 5 6 > >>   ∑:342  Sort:Rank