JDBC Tutorials - Herong's Tutorial Examples
This JDBC tutorial book is a collection of notes and sample codes written by the author while he was learning JDBC technology himself. It can be used as a tutorial guide for beginners. Topics include Java, Database, JDBC, Driver, ODBC, Connection, DataSource, SQL, ResultSet, Metadata, Derby, MySQL, ... 2020-03-07, 6797👍, 10💬
Cleartext Block Size for RSA Encryption
This section discusses what is the most efficient block size when dividing a Cleartext message into blocks for RSA public encryption. The suggested block size is 'floor((x-1)/8)', where 'x' is the RSA key size, or the key modulus bit length. 2020-03-13, 137👍, 1💬
EC Cryptography Tutorials - Herong's Tutorial Examples
This EC (Elliptic Curve) cryptography tutorial book is a collection of notes and sample codes written by the author while he was learning cryptography technologies himself. Topics include rule of chord and point addition on elliptic curves; Abelian groups with additive and multiplicative notations; ... 2020-03-07, 1160👍, 2💬
Illustration of DSA Algorithm: p,q=23,11
This section provides a tutorial example to illustrate how DSA digital signature algorithm works with small prime modulus p=23 and prime divisor q=11. 2020-02-24, 247👍, 3💬
Certificate in PEM Format
This section describes what is certificate PEM (Privacy Enhanced Mail) format - A format uses PEM idea to convert a certificate in DER format to a message of printable characters. The conversion uses the Base64 encoding. 2020-02-23, 4949👍, 4💬
DESSubkeysTest.java - DES Key Schedule Algorithm Illustration
This section provides a tutorial Java program, DESSubkeysTest.java, to illustrate how DES key schedule algorithm works. 2020-02-10, 873👍, 3💬
Blowfish - 8-Byte Block Cipher
This chapter provides tutorial examples and notes about Blowfish block cipher. Topics include Blowfish encryption and decryption algorithm; Blowfish sub-key generation schema, Blowfish algorithm implementation in Java. 2019-12-16, 153👍, 1💬
What Is DSA (Digital Signature Algorithm)?
This section describes the DSA (Digital Signature Algorithm) algorithm, which consists of 2 parts: generation of a pair of public key and private key; generation and verification of digital signature. 2019-10-22, 29115👍, 17💬
"OpenSSL" Viewing Certificates in DER and PEM
This section provides a tutorial example on how to use 'OpenSSL' to view certificates in DER and PEM formats generated by the 'keytool -exportcert' command. 2019-10-05, 40185👍, 7💬
Testing RsaKeyEncryption.java with a 16-bit Key
This section provides a tutorial example on testing my RSA encryption and decryption implementation using the java.math.BigInteger class with a 16-bit key. 2019-09-02, 107👍, 1💬
DES Decryption Algorithm
This section describes DES decryption algorithm - identical to the encryption algorithm step by step in the same order, only with the subkeys applied in the reverse order. 2019-06-17, 2963👍, 3💬
tinyec - Python Library for ECC
This chapter provides tutorial notes on 'tinyec' Python library for ECC. Topics include installing 'tinyec'; creating ec.Curve objects, performing point addition and scalar multiplication. 2019-05-10, 106👍, 1💬
Converting Secret Keys to and from Byte Arrays
This section provides a quick introduction of the SecretKeySpec class and the KeySpec interface. They can be used to convert secret keys into byte arrays to store them in external files. 2019-04-22, 9375👍, 4💬
RSA Private Key and Public Key Pair Sample
This section provides a tutorial example on how to run JcaKeyPair.java to generate a RSA private key and public key pair sample. Keys are stored PKCS#8 and X.509 encoding formats. 2019-04-03, 1050👍, 2💬
What Is Block Cipher?
This section describes what is block cipher - An encryption scheme in which 'the clear text is broken up into blocks of fixed length, and encrypted one block at a time'. 2019-04-03, 227👍, 2💬
java.security.KeyFactory - Reading Encoded Keys
This section describes the java.security.KeyFactory class, which allows you to convert key spec objects back to key objects. Full process of reading and converting encoded key files back to key objects are also provided. 2019-03-23, 252👍, 2💬
Example Vector of AES Encryption
An example vector of AES-128 encryption is presented. Round keys and state values of all 11 rounds are included to help users to verify their AES implementation. 2019-02-24, 158👍, 1💬
This section provides a tutorial example on how to download the WSDL document from the Web service p...
What is test testing area for? The testing area is provided to allow visitors to post testing commen...
This section provides a quick introduction of Web server log files with examples of IIS and Apache s...
This section provides a tutorial example on how to convert XML documents into pretty print format us...
This section describes differences between a SOAP 1.1 request and SOAP 1.2 request for GetSpeech Web...