EC Cryptography Tutorials - Herong's Tutorial Examples
This EC (Elliptic Curve) cryptography tutorial book is a collection of notes and sample codes written by the author while he was learning cryptography technologies himself. Topics include rule of chord and point addition on elliptic curves; Abelian groups with additive and multiplicative notations; ... 2019-07-06, 918👍, 3💬
"OpenSSL" Viewing Certificates in DER and PEM
This section provides a tutorial example on how to use 'OpenSSL' to view certificates in DER and PEM formats generated by the 'keytool -exportcert' command. 2019-10-05, 37947👍, 7💬
"keytool" Exporting Certificates in DER and PEM
This section provides a tutorial example on how to export certificates in DER and PEM format using the 'keytool -exportcert' command. 2019-02-20, 28132👍, 5💬
What Is DSA (Digital Signature Algorithm)?
This section describes the DSA (Digital Signature Algorithm) algorithm, which consists of 2 parts: generation of a pair of public key and private key; generation and verification of digital signature. 2019-10-22, 27895👍, 17💬
Cryptography Tutorials - Herong's Tutorial Examples
This cryptography tutorial book is a collection of notes and sample codes written by the author while he was learning cryptography technologies himself. Topics include AES, blowfish, certificate, cipher, decryption, DES, digest, encryption, keytool, MD5, OpenSSL, PEM, PKCS#8, PKCS#12, private key, p... 2017-08-05, 26978👍, 4💬
"keytool" Importing Certificates in DER and PEM
This section provides a tutorial example on how to use 'keytool' to import certificates in DER and PEM formats generated by 'OpenSSL' into 'keystore' files. 2018-06-28, 17607👍, 2💬
Using SHA1 Message Digest in Java
This section provides a tutorial example on how to use SHA1 message digest algorithm in Java. The JDK JCE package offers the SHA1 algorithm through a generic message digest class, javax.security.MessageDigest. 2018-12-04, 16754👍, 11💬
SHA1 Message Digest Algorithm Overview
This section describes the SHA1 algorithm - a 6-step process of padding of '1000...', appending message length, preparing 80 process functions, preparing 80 constants, preparing 5 word buffers, processing input in 512 blocks. 2018-12-28, 12064👍, 7💬
What Is DER (Distinguished Encoding Rules) Encoding?
This section describes the DER (Distinguished Encoding Rules) - A binary format of encoding a data value of any data types including nested data structures. 2018-10-29, 10339👍, 4💬
MD5 Message Digest Algorithm Overview
This section describes the MD5 algorithm - a 5-step process of padding of '1000...', appending message length, dividing as 512-bit blocks, initializing 4 buffers, and 4-round of hashing each block. 2016-11-21, 8837👍, 6💬
Converting Secret Keys to and from Byte Arrays
This section provides a quick introduction of the SecretKeySpec class and the KeySpec interface. They can be used to convert secret keys into byte arrays to store them in external files. 2019-04-22, 8565👍, 4💬
"openssl pkcs8" Converting Keys to PKCS#8 Format
This section provides a tutorial example on how to convert a private key file from the traditional format into PKCS#8 format using the 'openssl pkcs8' command. Keys can still be encoded with DER or PEM with or without DES encryption in PKCS#8 format. 2016-04-12, 7450👍, 1💬
DES Algorithm Java Implementation
This chapter provides tutorial examples and notes about DES algorithm implementation in Java language. Topics include an example Java implementation of DES encryption and decryption algorithm; test cases of single block cleartext and ciphertext. 2018-12-13, 6845👍, 16💬
What Is SHA1 Message Digest Algorithm?
This section describes what is SHA1 (Secure Hash Algorithm 1) - a message digest algorithm which takes as input a message of arbitrary length and produces as output a 160-bit 'fingerprint'. 2017-12-09, 5141👍, 6💬
DsaSignatureGenerator.java - Generating DSA Digital Signature
This section provides tutorial example on how to generate a digital signature for a message file with a DSA private key using the SHA1withDSA algorithm. 2017-03-13, 4716👍, 5💬
Certificate in PEM Format
This section describes what is certificate PEM (Privacy Enhanced Mail) format - A format uses PEM idea to convert a certificate in DER format to a message of printable characters. The conversion uses the Base64 encoding. 2016-03-30, 4334👍, 2💬
Subkeys of 3DES Encryption
Hi Doc, I have subkeys recovered through DPA. Can 3DES.c be modified to accept these subkeys as inputs for a cryptographic operation? Alternatively, can the main 3DES key be reverse generated from the subkeys? Thanks. email@example.com 2015-07-23, 3645👍, 1💬
Illustration of DSA Algorithm: p,q=7,3
This section provides a tutorial example to illustrate how DSA digital signature algorithm works with small prime modulus p=7 and prime divisor q=3. 2018-04-24, 3489👍, 5💬
This free book is an excellent tutorial book for beginners. It is a collection of notes and sample c...
Want to know when is the 2017 Chinese New Year day? Looking for Chinese calendars for 2017? Chinese ...
This chapter provides tutorial notes on the JDBC-ODBC Bridge driver produced by Sun and DataDirect. ...
This section describes how to create a Chinese HTML document in UTF-8 encoding and publish it on the...
This section describes how to connect to a DSN (Data Source Name) with JDBC-ODBC Bridge.