<< < 1 2 3   Sort: Rank

Illustration of RSA Algorithm: p,q=7,19
This section provides a tutorial example to illustrate how RSA public key encryption algorithm works with 2 small prime numbers 7 and 19.
2016-02-29, 839👍, 3💬

💬 2015-11-01 Herong: Jun, AES algorithm is added now, see Introduction to AES (Advanced Encryption Standard).

💬 2015-10-17 Herong: Jun, thank you for pointing out the mistake. I will correct it in the next version. AES will also be included.

💬 2015-10-16 jun: thanks a lot. your book makes everything clear for me except that I have not found a char for AES. By the way, I think "Generati...

RSA Implementation using java.math.BigInteger Class
This chapter provides tutorial notes and example codes on RSA implementation using Java BigInteger class. Topics include introduction of the java.math.BigInteger class; generating large probable prime numbers; generating RSA public key and private key; validating RSA keys; determining cleartext and ...
2016-02-29, 2093👍, 3💬

💬 2016-02-29 Herong: sah, is that an encoded comment?

💬 2016-02-28 sah: 7C4A8D09CA3762AF61E59520943DC26494F8 941B

💬 2014-02-06 Chinmayee: Searching for a book on RSAKey generation and got your link. Have not gone through the pdf yet. If find it good, will go for the...

Java Implementation of DES - Test Cases
This section provides two test cases for the Java implementation of DES algorithm, CipherDES.java.
2016-01-27, 131👍, 1💬

DESCipherTest.java - DES Cipher Algorithm Illustration
This section provides a tutorial Java program, DESCipherTest.java, to illustrate how DES cipher algorithm works.
2016-01-24, 601👍, 1💬

💬 2016-01-24 Joe: Output

Steps of Using DES Algorithm in JDK JCE
This section describes how to use DES algorithm provided in the JDK JCE package. Steps include building a secret key object from key material; creating and initializing a cipher object.
2016-01-24, 566👍, 1💬

💬 2016-01-24 Joe: Very nice

What Is SHA1 Message Digest Algorithm?
This section describes what is SHA1 (Secure Hash Algorithm 1) - a message digest algorithm which takes as input a message of arbitrary length and produces as output a 160-bit 'fingerprint'.
2016-01-18, 3914👍, 4💬

💬 2016-01-16 raza: i am raza see you latter

💬 2015-10-10 Herong: Ash, the next tutorial may help you understand better: SHA1 Message Digest Algorithm Overview

💬 2015-10-09 Ash: Please can u explain clearly..I dint understood

💬 2015-09-30 Hassan: hassan.ali.shaheen@gmail.com

What is ECB (Electronic CodeBook) Operation Mode?
This section describes what is ECB (Electronic CodeBook) Operation Mode - each plaintext block is encrypted independently without any input from other blocks.
2016-01-10, 2062👍, 2💬

💬 2016-01-10 Todd: Thanks!

Introduction to AES (Advanced Encryption Standard)
Tutorial notes and example codes on AES algorithms. Topics include introduction of AES (Advanced Encryption Standard); AES encryption algorithm; AES key schedule (round keys) algorithm and illustration example; MixColumns procedure algorithm; AES decryption algorithms.
2015-11-27, 235👍, 1💬

What is OFB (Output FeedBack) Operation Mode?
This section describes what is OFB (Output FeedBack) Operation Mode - each plaintext block is XORed with the current output block to be the ciphertext block. The current output block is the encrypted version of the previous output block.
2015-11-13, 1135👍, 2💬

💬 2015-11-13 Ashish: Hello world!

Converting Secret Keys to and from Byte Arrays
This section provides a quick introduction of the SecretKeySpec class and the KeySpec interface. They can be used to convert secret keys into byte arrays to store them in external files.
2015-11-03, 4573👍, 1💬

💬 2015-11-03 cpp: hello

Generating New RSA Key Pairs
This section provides a tutorial example on how to generate a new pair of RSA priviate key and public key using the OpenSSL command line tool.
2015-11-03, 720👍, 1💬

💬 2015-11-03 Juli: Thanks

Cryptography Terminology
This section provides descriptions on some commonly used cryptography terminologies
2015-10-24, 1813👍, 1💬

💬 2015-10-24 dexter aparicio: this site is my favorite reference on cryptography topics

Validating a Certificate Path with OpenSSL
This section provides a tutorial example on how to perform validation of a certificate path with the 'openssl verify' command.
2015-10-14, 15212👍, 5💬

💬 2015-10-14 Herong: Karnan, if the issuer is a root CA, issuer certificate should be in your trusted certificate store. If the issuer is an intermed...

💬 2015-10-13 karnan: how to get issuer certificate

💬 2015-09-02 Liang: Thanks, Yang, This is a very helpful for understanding the basic concept of Crypto/SSL.

💬 2015-08-14 Chris: If you have to specify an intermediate as trusted, that means the intermediate is not qualified to be a signer.

💬 2015-08-12 Aleksandar Kostadinov: I see a strange thing: openssl verify -CApath . <(cd /tmp ; cat server.pem intermediate.pem) That does not work if intermedia...

DES Key Schedule Algorithm Illustration Program Output
This section provides the execution output of the tutorial Java program, DESSubkeysTest.java, to illustrate how DES key schedule algorithm works.
2015-08-09, 1444👍, 1💬

💬 2015-08-08 nishant nath: I loved it

Subkeys of 3DES Encryption
Hi Doc, I have subkeys recovered through DPA. Can 3DES.c be modified to accept these subkeys as inputs for a cryptographic operation? Alternatively, can the main 3DES key be reverse generated from the subkeys? Thanks. jeffrey****alis@gmail.com
2015-07-23, 1440👍, 1💬

💬 2015-07-22 Herong: Hi Jeffrey, Which 3DES.c are you referring to? Can you tell me where I can see the code?

<< < 1 2 3   Sort: Rank