1 2 3 4 > >>   Sort: Rank

Visiting a "https" Web Site with Chrome
This section describes how Google Chrome 24 shows a lock icon when you visit an 'https' Web site to provide you more security related information.
2020-07-02, 290👍, 2💬

💬 2020-07-02 Koshal Pravin jangale: Nice

About This Book: EC Cryptography Tutorials
This section provides some detailed information about this book - EC Cryptography Tutorials - Herong's Tutorial Examples.
2020-06-23, 104👍, 1💬

💬 2020-06-23 chris: Thank so much ! All Crypto printed books in cart !! Very well done. Most useful books i've seen in quite some time.

EC Cryptography Tutorials - Herong's Tutorial Examples
This EC (Elliptic Curve) cryptography tutorial book is a collection of notes and sample codes written by the author while he was learning cryptography technologies himself. Topics include rule of chord and point addition on elliptic curves; Abelian groups with additive and multiplicative notations; ...
2020-06-23, 1470👍, 4💬

💬 2020-06-23 Herong: Chris, contact me by email. I will send you a PDF copy. Thanks for your comment.

💬 2020-06-22 chris: Sorry for fuss. Bought this ebook on google. bad idea. Should have not done that and just got the physical book or maybe ebook o...

💬 2019-07-02 Eleftheria Drosopoulou: Hello Herong, Nice blog! I am editor at Java Code Geeks (www.javacodegeeks.com). We have the JCG program (see www.javacodegeeks....

💬 2019-01-01 Yale: Thank you!

Illustration of DSA Algorithm: p,q=23,11
This section provides a tutorial example to illustrate how DSA digital signature algorithm works with small prime modulus p=23 and prime divisor q=11.
2020-06-22, 481👍, 4💬

💬 2020-06-22 Filip: Very helpful, thanks!

💬 2020-02-24 Herong: Sanjay, hash value of 3 was used as a simple example, not calculated.

💬 2020-02-18 Sanjay: How hash value h =3 ? how you calxulate

Introduction of DSA (Digital Signature Algorithm)
This chapter provides tutorial notes and example codes on DSA (Digital Signature Algorithm). Topics include introduction of DSA; illustration of DSA key generation, message signing and signature verification; proof of Digital Signature Algorithm.
2020-06-04, 3854👍, 12💬

💬 2020-06-04 ben: How are you?

💬 2018-04-07 Digital Signature Algorithm: Conclusions: DSA (Digital Signature Algorithm) uses public key and private key to generate and verify digital signatures. DSA pu...

💬 2018-04-07 Submit Your Comment: Please write meaningful comments. Thanks! ☺

💬 2018-04-07 world: hello

💬 2018-02-20 amit: hello

(More comments ...)

What Is DER (Distinguished Encoding Rules) Encoding?
This section describes the DER (Distinguished Encoding Rules) - A binary format of encoding a data value of any data types including nested data structures.
2020-06-01, 12330👍, 5💬

💬 2018-10-29 Thanks!: meaningful comments.

💬 2017-03-15 noname: thanks

💬 2016-01-25 Dev: hello

DES Decryption Algorithm
This section describes DES decryption algorithm - identical to the encryption algorithm step by step in the same order, only with the subkeys applied in the reverse order.
2020-05-19, 3320👍, 4💬

💬 2020-05-19 Nick: test comment

💬 2019-06-17 bIPFaV0PLbO9qrDgn+p43A==: bIPFaV0PLbO9qrDgn+p43A==

💬 2017-12-16 Herong: deepak, is this a encrypted comment?

💬 2017-12-11 deepak: 9bc94bbaf6d380eb8f8c6548b2cf6343ccef 5978768e3d69b796d6ef0839172b

Cleartext Block Size for RSA Encryption
This section discusses what is the most efficient block size when dividing a Cleartext message into blocks for RSA public encryption. The suggested block size is 'floor((x-1)/8)', where 'x' is the RSA key size, or the key modulus bit length.
2020-03-13, 137👍, 1💬

Certificate in PEM Format
This section describes what is certificate PEM (Privacy Enhanced Mail) format - A format uses PEM idea to convert a certificate in DER format to a message of printable characters. The conversion uses the Base64 encoding.
2020-02-23, 5326👍, 4💬

💬 2020-02-23 Herong: Mark, if your certificate is signed by your own CA, put it on the Apache server together with the CA certificate to test. Other ...

💬 2020-02-17 mark scorfield: Hi i have a pem certificate x509 that i would like to share against my own certificate signing authority , what is the best way ...

💬 2016-03-30 Herong: Bcbin, why don't you post your question here? Maybe others can help you too. Or send me an email directly.

💬 2016-03-27 bcbin: my name is bcbin, my email is bcbin@yahoo.com. please connecting me. i need you help ):

What Is a Digital Signature?
This section describes what is a digital signature and what is the process of generating and verifying digital signature from a message.
2020-02-23, 3199👍, 4💬

💬 2020-02-23 Herong: Sanjay, you are welcome!

💬 2020-02-17 Sanjay: Thank u so much

💬 2019-01-29 nilo: Hola

💬 2016-04-26 santosh patil: Its easy to understand

DESSubkeysTest.java - DES Key Schedule Algorithm Illustration
This section provides a tutorial Java program, DESSubkeysTest.java, to illustrate how DES key schedule algorithm works.
2020-02-10, 942👍, 3💬

💬 2020-02-10 Art: No comments

💬 2018-07-20 aqil: havr fun

mcrypt Library for PHP
This section describes the mcrypt library - encryption extension for PHP. mcrypt supports DES and many other encryption algorithms.
2019-12-19, 114👍, 1💬

Blowfish - 8-Byte Block Cipher
This chapter provides tutorial examples and notes about Blowfish block cipher. Topics include Blowfish encryption and decryption algorithm; Blowfish sub-key generation schema, Blowfish algorithm implementation in Java.
2019-12-16, 198👍, 1💬

💬 2019-12-16 gio: i love you

"OpenSSL" Generating Certificates in DER and PEM
This section provides a tutorial example on how to generate certificates in DER and PEM formats using 'OpenSSL'.
2019-11-30, 106👍, 1💬

What Is DSA (Digital Signature Algorithm)?
This section describes the DSA (Digital Signature Algorithm) algorithm, which consists of 2 parts: generation of a pair of public key and private key; generation and verification of digital signature.
2019-10-22, 29787👍, 17💬

💬 2018-08-29 Shawn: Thanks for the detailed explanation.

💬 2017-10-29 Abi: Very informative

💬 2017-04-01 Herong: T, A double asterisk ** is the exponentiation operation that raise a base to a power.

💬 2017-03-27 t: What is "**"?

💬 2017-03-10 appalaraju: useful

(More comments ...)

"OpenSSL" Viewing Certificates in DER and PEM
This section provides a tutorial example on how to use 'OpenSSL' to view certificates in DER and PEM formats generated by the 'keytool -exportcert' command.
2019-10-05, 41674👍, 7💬

💬 2019-10-05 Herong: Fatin, what are you getting from the output?

💬 2019-09-27 Fatin: Please help me, i cannot get it that way

💬 2017-05-27 Herong: Yes, asn1parse is a nice tool. I will add some examples later.

💬 2017-05-23 poshak: MIIC8DCCAIGgAwIBAgIJAM/+E5HIKoWGMAoG ...

💬 2017-05-23 Herong: Poshak, do you need any help with your certificate?

(More comments ...)

Testing RsaKeyEncryption.java with a 16-bit Key
This section provides a tutorial example on testing my RSA encryption and decryption implementation using the java.math.BigInteger class with a 16-bit key.
2019-09-02, 107👍, 1💬

PDF Printing Version: Cryptography Tutorials
Information on how to obtain the PDF version of this book for printing.
2019-07-04, 7158👍, 35💬

💬 2019-07-04 aladdin: thanks

💬 2018-10-20 Herong: bachi, thanks for sharing your comment.

💬 2018-10-13 bachi: I like how you composed your content. I like how you explain the DES algorithm

💬 2018-09-12 aaa: thanks

💬 2018-01-21 ahmed: thanks for your sharing

(More comments ...)

References Used in Cryptography Tutorials
List of reference materials used in this book.
2019-06-30, 234👍, 1💬

💬 2019-06-30 Wayne: This is very helpful, Thank you!

tinyec - Python Library for ECC
This chapter provides tutorial notes on 'tinyec' Python library for ECC. Topics include installing 'tinyec'; creating ec.Curve objects, performing point addition and scalar multiplication.
2019-05-10, 106👍, 1💬

"keytool" Generating Maria's Private Key
This section provides a tutorial example on how to use 'keytool' to generate a pair of private key and public key.
2019-05-08, 117👍, 1💬

First 8336 Hex Digits of PI
This section provides first 8336 hex digits of constant PI, 3.1415927..., needed for Blowfish encryption algorithm.
2019-04-29, 5631👍, 10💬

💬 2019-04-28 Herong: 8336 Hex Digits. Thanks.

💬 2019-04-26 Harry: Do you mean 8336 digits

💬 2016-10-31 Andres: cool

💬 2016-04-07 Tamas Losonczi: This is great

💬 2016-03-15 Bogdan: Thanks!

(More comments ...)

Converting Secret Keys to and from Byte Arrays
This section provides a quick introduction of the SecretKeySpec class and the KeySpec interface. They can be used to convert secret keys into byte arrays to store them in external files.
2019-04-22, 9875👍, 4💬

💬 2019-04-22 xyz: $9$RTHhSlWL7VsguO7dbw4oiHqf6CuOIRhyl K4JGDq.TQF/OIcyeLXNbsPTz3CAW8X

💬 2018-10-20 Herong: Marco, I just did a Google translation on your comment: "I wonder what all this could be". Are you trying to ask a question?

💬 2018-10-16 Marco: mi chiedo che cosa potrebbe essere tutto questo

💬 2015-11-03 cpp: hello

RSA Private Key and Public Key Pair Sample
This section provides a tutorial example on how to run JcaKeyPair.java to generate a RSA private key and public key pair sample. Keys are stored PKCS#8 and X.509 encoding formats.
2019-04-03, 1195👍, 2💬

💬 2019-03-31 Herong: Thong, if you lost access to your BTC wallet, or lost your BTC wallet, then you lost your BTC asset. There is no way to get it b...

💬 2019-03-29 Thong Ngo: Hi . I forgot the id wallet btc, is there any way to find the id wallet btc no? Thanks .

1 2 3 4 > >>   Sort: Rank