Popular Books:
First 8336 Hex Digits of PI
This section provides first 8336 hex digits of constant PI, 3.1415927..., needed for Blowfish encryption algorithm. 2025-04-28, ∼8210🔥, 13💬
💬 2019-04-28 Herong: 8336 Hex Digits. Thanks.
💬 2019-04-26 Harry: Do you mean 8336 digits
💬 2017-12-09 Herong: See the next tutorial: SHA1 Message Digest Algorithm Overview .
💬 2017-12-04 V: where can we find sha-1 formula ?
💬 2016-01-16 raza: i am raza see you latter
💬 2015-10-09 Ash: Please can u explain clearly..I dint understood
DES Decryption Algorithm
This section describes DES decryption algorithm - identical to the encryption algorithm step by step in the same order, only with the subkeys applied in the reverse order. 2020-05-19, ∼6725🔥, 4💬
💬 2020-05-19 Nick: test comment
💬 2019-06-17 bIPFaV0PLbO9qrDgn+p43A==: bIPFaV0PLbO9qrDgn+p43A==
💬 2017-12-16 Herong: deepak, is this a encrypted comment?
💬 2017-12-11 deepak: 9bc94bbaf6d380eb8f8c6548b2cf6343ccef 5978768e3d69b796d6ef0839172b
Illustration of DSA Algorithm: p,q=23,11
This section provides a tutorial example to illustrate how DSA digital signature algorithm works with small prime modulus p=23 and prime divisor q=11. 2023-11-19, ∼6475🔥, 10💬
💬 2021-12-24 Muhammad Ghulam Ghouse: Appreciated
💬 2021-11-15 123: AD E0 B8 1E BF B4 41 27 5D 52 11 98 30 AE F1 E5
💬 2017-03-13 dingdong: heheheheehhe
💬 2016-10-15 Herong: Akash, can you check to ensure your key is a DSA key?
What is ECB (Electronic CodeBook) Operation Mode?
This section describes what is ECB (Electronic CodeBook) Operation Mode - each plaintext block is encrypted independently without any input from other blocks. 2024-01-29, ∼5845🔥, 5💬
💬 2020-10-18 Herong: donjo, there is no real applications that use the ECB mode.
💬 2020-10-16 donjo dumdum: What is application of ECB mode operation
DES (Data Encryption Standard) Cipher Algorithm
This section describes DES (Data Encryption Standard) algorithm - A 16-round Feistel cipher with block size of 64 bits. 2015-11-05, ∼5820🔥, 8💬
💬 2015-11-04 The Anh: what if my key don't have enough bit?
💬 2015-11-03 zaeem: how to implement on windows form in c#
💬 2015-10-03 Herong: Mihir, what type of algorithm are you looking for?
💬 2020-06-04 ben: How are you?
💬 2018-04-07 Submit Your Comment: Please write meaningful comments. Thanks! ☺
"secp256r1" - For 256-Bit ECC Keys
This section describes 'secp256r1' elliptic curve domain parameters for generating 256-Bit ECC Keys as specified by secg.org. 2023-10-20, ∼5261🔥, 1💬
AES Key Schedule Example
An example of the AES key schedule is provided to illustrate how 11 round keys get calculate from a given 128-bit cipher key. 2019-02-18, ∼5261🔥, 1💬
Viewing Components of RSA Keys
This section provides a tutorial example on how to view different components of a pair of RSA private key and public key using the OpenSSL command line tool. 2016-03-14, ∼4596🔥, 2💬
💬 2015-10-02 Herong: Looks like someone is testing Base64 encoding here :-)
RsaKeyGenerator.java for RSA Key Generation
This section describes the initial draft of a RSA public key and private key generation implementation using the java.math.BigInteger class. 2017-01-05, ∼4375🔥, 2💬
What Is a Digital Signature?
This section describes what is a digital signature and what is the process of generating and verifying digital signature from a message. 2020-02-23, ∼4358🔥, 4💬
💬 2020-02-23 Herong: Sanjay, you are welcome!
EC Key in PEM File Format
This section provides a tutorial example on the EC key PEM file format. EC domain parameters are stored together with the private key. 2023-09-17, ∼4248🔥, 1💬
Illustration of RSA Algorithm: p,q=7,19
This section provides a tutorial example to illustrate how RSA public key encryption algorithm works with 2 small prime numbers 7 and 19. 2016-02-29, ∼4205🔥, 3💬
💬 2016-02-29 Herong: sah, is that an encoded comment?
Generate secp256k1 Keys with OpenSSL
This section provides a tutorial example on how to generate EC (Elliptic Curve) private and public key pairs using secp256k1 domain parameters. 2023-08-10, ∼4049🔥, 3💬
Popular Posts:
This section describes two key methods in the XML::Simple module, XMLin() and XMLout(), to convert X...
This section provides a tutorial example on how to create a configuration entry to support WS-Securi...
This section provides a tutorial example on how to download and install Samsung USB Driver for Mobil...
This section provides a tutorial example showing how to use space-before and space-after to override...
This section describes how to create a table with an AUTO_INCREMENT column.