<< < 1 2 3   Sort: Rank

DESCipherTest.java - DES Cipher Algorithm Illustration
This section provides a tutorial Java program, DESCipherTest.java, to illustrate how DES cipher algorithm works.
2016-01-24, 485👍, 1💬

💬 2016-01-24 Joe: Output

Steps of Using DES Algorithm in JDK JCE
This section describes how to use DES algorithm provided in the JDK JCE package. Steps include building a secret key object from key material; creating and initializing a cipher object.
2016-01-24, 492👍, 1💬

💬 2016-01-24 Joe: Very nice

What Is SHA1 Message Digest Algorithm?
This section describes what is SHA1 (Secure Hash Algorithm 1) - a message digest algorithm which takes as input a message of arbitrary length and produces as output a 160-bit 'fingerprint'.
2016-01-18, 3497👍, 4💬

💬 2016-01-16 raza: i am raza see you latter

💬 2015-10-10 Herong: Ash, the next tutorial may help you understand better: SHA1 Message Digest Algorithm Overview

💬 2015-10-09 Ash: Please can u explain clearly..I dint understood

💬 2015-09-30 Hassan: hassan.ali.shaheen@gmail.com

What is ECB (Electronic CodeBook) Operation Mode?
This section describes what is ECB (Electronic CodeBook) Operation Mode - each plaintext block is encrypted independently without any input from other blocks.
2016-01-10, 1804👍, 2💬

💬 2016-01-10 Todd: Thanks!

PHP Implementation of DES - mcrypt
This chapter provides tutorial examples and notes about PHP implementation of DES. Topics include introduction of mcrypt library; mcrypt encryption functions; DES encryption and decryption test program and test result.
2016-01-02, 751👍, 1💬

💬 2016-01-02 sivaprakash: nice

Introduction to AES (Advanced Encryption Standard)
Tutorial notes and example codes on AES algorithms. Topics include introduction of AES (Advanced Encryption Standard); AES encryption algorithm; AES key schedule (round keys) algorithm and illustration example; MixColumns procedure algorithm; AES decryption algorithms.
2015-11-27, 229👍, 1💬

What is OFB (Output FeedBack) Operation Mode?
This section describes what is OFB (Output FeedBack) Operation Mode - each plaintext block is XORed with the current output block to be the ciphertext block. The current output block is the encrypted version of the previous output block.
2015-11-13, 987👍, 2💬

💬 2015-11-13 Ashish: Hello world!

Converting Secret Keys to and from Byte Arrays
This section provides a quick introduction of the SecretKeySpec class and the KeySpec interface. They can be used to convert secret keys into byte arrays to store them in external files.
2015-11-03, 3946👍, 1💬

💬 2015-11-03 cpp: hello

Generating New RSA Key Pairs
This section provides a tutorial example on how to generate a new pair of RSA priviate key and public key using the OpenSSL command line tool.
2015-11-03, 623👍, 1💬

💬 2015-11-03 Juli: Thanks

Cryptography Terminology
This section provides descriptions on some commonly used cryptography terminologies
2015-10-24, 1615👍, 1💬

💬 2015-10-24 dexter aparicio: this site is my favorite reference on cryptography topics

Validating a Certificate Path with OpenSSL
This section provides a tutorial example on how to perform validation of a certificate path with the 'openssl verify' command.
2015-10-14, 14364👍, 5💬

💬 2015-10-14 Herong: Karnan, if the issuer is a root CA, issuer certificate should be in your trusted certificate store. If the issuer is an intermed...

💬 2015-10-13 karnan: how to get issuer certificate

💬 2015-09-02 Liang: Thanks, Yang, This is a very helpful for understanding the basic concept of Crypto/SSL.

💬 2015-08-14 Chris: If you have to specify an intermediate as trusted, that means the intermediate is not qualified to be a signer.

💬 2015-08-12 Aleksandar Kostadinov: I see a strange thing: openssl verify -CApath . <(cd /tmp ; cat server.pem intermediate.pem) That does not work if intermedia...

DES Key Schedule Algorithm Illustration Program Output
This section provides the execution output of the tutorial Java program, DESSubkeysTest.java, to illustrate how DES key schedule algorithm works.
2015-08-09, 1310👍, 1💬

💬 2015-08-08 nishant nath: I loved it

Subkeys of 3DES Encryption
Hi Doc, I have subkeys recovered through DPA. Can 3DES.c be modified to accept these subkeys as inputs for a cryptographic operation? Alternatively, can the main 3DES key be reverse generated from the subkeys? Thanks. jeffrey****alis@gmail.com
2015-07-23, 1052👍, 1💬

💬 2015-07-22 Herong: Hi Jeffrey, Which 3DES.c are you referring to? Can you tell me where I can see the code?

<< < 1 2 3   Sort: Rank