1 2 3 > >>   Sort: Rank

DES Algorithm Java Implementation
This chapter provides tutorial examples and notes about DES algorithm implementation in Java language. Topics include an example Java implementation of DES encryption and decryption algorithm; test cases of single block cleartext and ciphertext.
2017-04-23, 4968👍, 12💬

💬 2017-04-23 aa: thanks

💬 2017-02-15 gg: lolol

💬 2016-11-21 allas: super

💬 2016-11-21 priya: good

💬 2016-08-17 revathiganeshan: it is very usefull to me

(More comments ...)

What Is DSA (Digital Signature Algorithm)?
This section describes the DSA (Digital Signature Algorithm) algorithm, which consists of 2 parts: generation of a pair of public key and private key; generation and verification of digital signature.
2017-04-01, 17932👍, 13💬

💬 2017-04-01 Herong: T, A double asterisk ** is the exponentiation operation that raise a base to a power.

💬 2017-03-27 t: What is "**"?

💬 2017-03-10 appalaraju: useful

💬 2016-12-04 Herong: Krishna, you are welcome!

💬 2016-12-02 Krishna: Very useful SIR, thank you

(More comments ...)

What Is DER (Distinguished Encoding Rules) Encoding?
This section describes the DER (Distinguished Encoding Rules) - A binary format of encoding a data value of any data types including nested data structures.
2017-03-30, 3959👍, 3💬

💬 2017-03-15 noname: thanks

💬 2016-01-25 Dev: hello

Installing OpenSSL on Windows
This section provides a tutorial example on how to install OpenSSL on a Windows system.
2017-03-30, 33406👍, 16💬

💬 2017-02-03 Jim: Now run along...

💬 2017-02-03 Jim: If I did this just once we would not be even, cause you did it once when you put it up here..

💬 2016-12-19 red: Please write meaningful comments. Thanks!

💬 2016-12-19 Thank: Thanks!

💬 2016-11-11 Herong: Blessing, do you know in which folder you installed OpenSSL? You may want to try to run the openssl command with the path name i...

(More comments ...)

PDF Printing Version: Cryptography Tutorials
Information on how to obtain the PDF version of this book for printing.
2017-03-14, 4301👍, 26💬

💬 2017-02-17 xiaoxiaoyuanzi: the one i'm looking for, Thanks!

💬 2017-02-14 kiki: thanks, great book

💬 2016-11-15 Demon: great book, thanks!

💬 2016-09-27 Dj99: Thanks!

💬 2016-09-15 vijay: great book

(More comments ...)

DsaSignatureGenerator.java - Generating DSA Digital Signature
This section provides tutorial example on how to generate a digital signature for a message file with a DSA private key using the SHA1withDSA algorithm.
2017-03-13, 1357👍, 5💬

💬 2017-03-13 dingdong: heheheheehhe

💬 2016-10-15 Herong: Akash, can you check to ensure your key is a DSA key?

💬 2016-10-14 Akash: Exception occurs as follows: java.security.spec.InvalidKeySpecExc eption:Inappropriate key specification what it means? can you ...

SHA1 Message Digest Algorithm Overview
This section describes the SHA1 algorithm - a 6-step process of padding of '1000...', appending message length, preparing 80 process functions, preparing 80 constants, preparing 5 word buffers, processing input in 512 blocks.
2017-03-07, 7590👍, 5💬

💬 2017-03-07 g: gud

💬 2016-01-19 stephie: hai how are you

What Is Cryptography?
This section describes what is cryptography - The study of techniques related to all aspects of data security.
2017-02-18, 1705👍, 5💬

💬 2017-02-18 gabu: ggoodd

💬 2016-11-17 mohamed: yes

💬 2015-10-20 Herong: Hi Ian, the Rail Fence cipher is very simple example of encryption we can do manually. See the Transposition cipher page at wiki...

💬 2015-10-19 Ian T. Lee: Can you give me a simple example of how to do cryptography manually?

💬 2015-08-06 arnav: good

CipherDES.java - A Java Implementation of DES
This section provides a tutorial Java program, CipherDES.java - A Java Implementation of DES encryption and decryption algorithm.
2017-02-16, 8270👍, 9💬

💬 2017-02-16 Herong: Andro, I think implementation of DES using String methods will be slower than using byte and int operations.

💬 2017-02-12 Andro: Good done. I have created my own DES with benefits of string methods in Java. My DES receives binary string and key, then cipher...

💬 2016-03-03 Dede: Helps a lot, currently developping a mobile application that has to do with encryption. Thanks

💬 2015-10-16 Herong: Skip, Good luck on your study!

💬 2015-10-15 Skip: I'm taking a graduate course in cryptography and this was extremely helpful for going from DES visual to DES in java. I really a...

(More comments ...)

Viewing Certificate Path
This section provides a tutorial example on how to view certificate path when visiting an 'https' Web site in IE 9. The top certificate in a certificate path is the CA certificate, which is trusted automatically.
2017-01-31, 228👍, 1💬

💬 2017-01-31 kishor: -----BEGIN CERTIFICATE----- MIIDqjCCApICCQC6MOh9nHUvUjANBgkqhkiG 9w0BAQUFADCBljELMAkGA1UEBhMCVVMxETAPBgNVBAgTCENvbG9yYWRvMRMwEQY. ..

Using MD5 Message Digest in Java
This section provides a tutorial example on how to use MD5 message digest algorithm in Java. The JDK JCE package offers the MD5 algorithm through a generic message digest class, javax.security.MessageDigest.
2017-01-27, 137👍, 2💬

What is CFB (Cipher FeedBack) Operation Mode?
This section describes what is CFB (Cipher FeedBack) Operation Mode - each plaintext block is XORed with the encrypted version of the ciphertext of the previous block to be the ciphertext block.
2017-01-13, 1305👍, 3💬

💬 2016-12-07 fakhrulislam: i want a copy of this book !

💬 2015-11-06 poonam: a perfect explanation

RsaKeyGenerator.java for RSA Key Generation
This section describes the initial draft of a RSA public key and private key generation implementation using the java.math.BigInteger class.
2017-01-05, 717👍, 2💬

💬 2017-01-05 Herong: Alex, you are right. q should be selected independently from p. I will make a change in the next revision.

💬 2016-12-28 Alex T.: Using nextProbablePrime() to compute q appears somewhat risky to me: An attacker with the knowledge of N=p*q could simply comput...

mcrypt DES Encryption Testing Program
This section provides a tutorial example on how to use the DES algorithm in a specific operation mode as block or stream cipher.
2016-12-13, 112👍, 1💬

Introduction of DSA (Digital Signature Algorithm)
This chapter provides tutorial notes and example codes on DSA (Digital Signature Algorithm). Topics include introduction of DSA; illustration of DSA key generation, message signing and signature verification; proof of Digital Signature Algorithm.
2016-12-06, 787👍, 5💬

OpenSSL Introduction and Installation
This chapter provides tutorial notes and example codes on OpenSSL. Topics include introduction of OpenSSL; installing OpenSSL on Windows systems.
2016-11-28, 393👍, 3💬

💬 2016-11-28 musa: thanks

MD5 Message Digest Algorithm Overview
This section describes the MD5 algorithm - a 5-step process of padding of '1000...', appending message length, dividing as 512-bit blocks, initializing 4 buffers, and 4-round of hashing each block.
2016-11-21, 4277👍, 6💬

💬 2016-11-21 this is a burner: concise and accurate, thanks

💬 2016-09-26 brijesh gupta: its helpful

💬 2016-06-17 Ampera: Makasih

RSA Public Key Encryption Algorithm
This section describes the RSA public key encryption algorithm. Generating public and private keys used in RSA encryption requires two large prime numbers.
2016-11-21, 120👍, 1💬

DES Encryption Operation Modes
This chapter provides tutorial examples and notes about DES encryption operation modes. Topics include how different blocks of plaintext can be coupled together to improve the strength of the DES encryption algorithm; ECB (Electronic CodeBook), CBC (Cipher Block Chaining), CFB (Cipher FeedBack), and...
2016-11-12, 190👍, 1💬

💬 2016-11-12 kazim: very good webpage

DES Key Schedule (Round Keys Generation) Algorithm
This section describes DES (Data Encryption Standard) algorithm - A 16-round Feistel cipher with block size of 64 bits.
2016-11-10, 5813👍, 8💬

💬 2015-12-15 Aleksandar: I want to encrypt using DES

💬 2015-10-31 star: Those left shifts were helpful, Thanks ☺

💬 2015-10-24 Herong: Yes. The world is wonderful and beautiful! :-)

💬 2015-10-19 jaffa: beautiful

💬 2015-10-19 pakodi: wonderful

(More comments ...)

SHA1 Mesasge Digest Algorithm
This chapter provides tutorial notes and example codes on the SHA1 message digest algorithm. Topics include SHA1 algorithm overview; using SHA1 in Java, PHP, and Perl.
2016-11-05, 1085👍, 5💬

💬 2015-10-14 Herong: Yojana, information on key generation of Blowfish Algorithm can be found in Key Schedule (Sub-Keys Generation) Algorithm tutoria...

💬 2015-10-13 Yojana Yadav: Plz send me the detail of key generation of Blowfish Algorithm

💬 2013-06-28 Herong: Abbas, You are welcome!

💬 2013-06-26 abbas: thank you for sha-1 and it's so helpful

First 8336 Hex Digits of PI
This section provides first 8336 hex digits of constant PI, 3.1415927..., needed for Blowfish encryption algorithm.
2016-10-31, 3194👍, 8💬

💬 2016-10-31 Andres: cool

💬 2016-04-07 Tamas Losonczi: This is great

💬 2016-03-15 Bogdan: Thanks!

💬 2015-12-03 Herong: Sadi, we only need (18*32+4*256*32)/4=8336 hex digits for the Blowfish encryption algorithm. I have typos in my tutorials. I wil...

💬 2015-12-02 Sadi: Sorry, I meant "8336 and not 8366"... Also would you like to compare these with "http://hexpi.sourceforge.net/" as there are som...

(More comments ...)

Using SHA1 Message Digest in Java
This section provides a tutorial example on how to use SHA1 message digest algorithm in Java. The JDK JCE package offers the SHA1 algorithm through a generic message digest class, javax.security.MessageDigest.
2016-10-24, 10375👍, 5💬

💬 2016-10-24 appu: thanks!

💬 2016-09-01 Shubham: well done.

💬 2016-02-18 saravanan: thanks

💬 2016-02-09 rajkumar: the given algorithm will be very useful........

💬 2015-09-21 prabha: good

"keytool" Importing CA's Own Certificate
This section provides a tutorial example on how to import CA's certificate generated by 'OpenSSL' into a 'keystore' file using 'keytool'
2016-10-20, 288👍, 2💬

💬 2016-10-20 Herong: Akhtar, AES256 encryption does not require any certificates. It requires a secret AES key, see Introduction to AES (Advanced Enc...

💬 2016-10-19 Akhtar: I have also a certificate file (.cer) .I did the same procedure to import in to mykey store and got .jks file but, now i want to...

1 2 3 > >>   Sort: Rank