JDBC Tutorials - Herong's Tutorial Examples
This JDBC tutorial book is a collection of notes and sample codes written by the author while he was learning JDBC technology himself. It can be used as a tutorial guide for beginners. Topics include Java, Database, JDBC, Driver, ODBC, Connection, DataSource, SQL, ResultSet, Metadata, Derby, MySQL, ... 2020-03-07, 7314👍, 10💬
Converting Secret Keys to and from Byte Arrays
This section provides a quick introduction of the SecretKeySpec class and the KeySpec interface. They can be used to convert secret keys into byte arrays to store them in external files. 2020-11-23, 10793👍, 5💬
DES Algorithm Java Implementation
This chapter provides tutorial examples and notes about DES algorithm implementation in Java language. Topics include an example Java implementation of DES encryption and decryption algorithm; test cases of single block cleartext and ciphertext. 2020-11-11, 7051👍, 17💬
EC Private and Public Key Pair
This section introduces what is EC (Elliptic Curve) key pair - a pair of private key and public key constructed from a given subgroup generator in a given elliptic curve group. 2020-11-07, 113👍, 1💬
What is ECB (Electronic CodeBook) Operation Mode?
This section describes what is ECB (Electronic CodeBook) Operation Mode - each plaintext block is encrypted independently without any input from other blocks. 2020-10-18, 3577👍, 4💬
Geometric Introduction to Elliptic Curves
This chapter provides a geometric introduction of elliptic curves and the associated addition operation. Topics includes what is an elliptic curve and its geometric properties; geometric algorithm defining an addition operation; infinity point or identity element; commutativity and associativity of ... 2020-09-12, 166👍, 1💬
Visiting a "https" Web Site with Chrome
This section describes how Google Chrome 24 shows a lock icon when you visit an 'https' Web site to provide you more security related information. 2020-07-02, 342👍, 2💬
EC Cryptography Tutorials - Herong's Tutorial Examples
This EC (Elliptic Curve) cryptography tutorial book is a collection of notes and sample codes written by the author while he was learning cryptography technologies himself. Topics include rule of chord and point addition on elliptic curves; Abelian groups with additive and multiplicative notations; ... 2020-06-23, 1610👍, 4💬
Illustration of DSA Algorithm: p,q=23,11
This section provides a tutorial example to illustrate how DSA digital signature algorithm works with small prime modulus p=23 and prime divisor q=11. 2020-06-22, 602👍, 4💬
Introduction of DSA (Digital Signature Algorithm)
This chapter provides tutorial notes and example codes on DSA (Digital Signature Algorithm). Topics include introduction of DSA; illustration of DSA key generation, message signing and signature verification; proof of Digital Signature Algorithm. 2020-06-04, 3981👍, 12💬
What Is DER (Distinguished Encoding Rules) Encoding?
This section describes the DER (Distinguished Encoding Rules) - A binary format of encoding a data value of any data types including nested data structures. 2020-06-01, 13334👍, 5💬
DES Decryption Algorithm
This section describes DES decryption algorithm - identical to the encryption algorithm step by step in the same order, only with the subkeys applied in the reverse order. 2020-05-19, 3644👍, 4💬
Cleartext Block Size for RSA Encryption
This section discusses what is the most efficient block size when dividing a Cleartext message into blocks for RSA public encryption. The suggested block size is 'floor((x-1)/8)', where 'x' is the RSA key size, or the key modulus bit length. 2020-03-13, 137👍, 1💬
Certificate in PEM Format
This section describes what is certificate PEM (Privacy Enhanced Mail) format - A format uses PEM idea to convert a certificate in DER format to a message of printable characters. The conversion uses the Base64 encoding. 2020-02-23, 5917👍, 4💬
DESSubkeysTest.java - DES Key Schedule Algorithm Illustration
This section provides a tutorial Java program, DESSubkeysTest.java, to illustrate how DES key schedule algorithm works. 2020-02-10, 1014👍, 3💬
Blowfish - 8-Byte Block Cipher
This chapter provides tutorial examples and notes about Blowfish block cipher. Topics include Blowfish encryption and decryption algorithm; Blowfish sub-key generation schema, Blowfish algorithm implementation in Java. 2019-12-16, 282👍, 1💬
What Is DSA (Digital Signature Algorithm)?
This section describes the DSA (Digital Signature Algorithm) algorithm, which consists of 2 parts: generation of a pair of public key and private key; generation and verification of digital signature. 2019-10-22, 30311👍, 17💬
"OpenSSL" Viewing Certificates in DER and PEM
This section provides a tutorial example on how to use 'OpenSSL' to view certificates in DER and PEM formats generated by the 'keytool -exportcert' command. 2019-10-05, 43269👍, 7💬
Testing RsaKeyEncryption.java with a 16-bit Key
This section provides a tutorial example on testing my RSA encryption and decryption implementation using the java.math.BigInteger class with a 16-bit key. 2019-09-02, 107👍, 1💬
This section describes how to connect to a SQL Server 2005 through DSN with JDBC-ODBC Bridge.
This cryptography tutorial book is a collection of notes and sample codes written by the author whil...
This section describes a tutorial example of a complete SOAP application with both server and client...
This section provides a quick introduction of the UTF-16LE (Unicode Transformation Format - 16-bit L...
This section provides a tutorial example on how to check FTP server log file.