Cryptography Tutorials - Herong's Tutorial Examples
This cryptography tutorial book is a collection of notes and sample codes written by the author while he was learning cryptography technologies himself. Topics include AES, blowfish, certificate, cipher, decryption, DES, digest, encryption, keytool, MD5, OpenSSL, PEM, PKCS#8, PKCS#12, private key, p... 2017-03-02, 12205👍, 2💬
Steps of Using DES Algorithm in JDK JCE
This section describes how to use DES algorithm provided in the JDK JCE package. Steps include building a secret key object from key material; creating and initializing a cipher object. 2016-01-24, 476👍, 1💬
What Is SHA1 Message Digest Algorithm?
This section describes what is SHA1 (Secure Hash Algorithm 1) - a message digest algorithm which takes as input a message of arbitrary length and produces as output a 160-bit 'fingerprint'. 2016-01-18, 3406👍, 4💬
What is ECB (Electronic CodeBook) Operation Mode?
This section describes what is ECB (Electronic CodeBook) Operation Mode - each plaintext block is encrypted independently without any input from other blocks. 2016-01-10, 1758👍, 2💬
PHP Implementation of DES - mcrypt
This chapter provides tutorial examples and notes about PHP implementation of DES. Topics include introduction of mcrypt library; mcrypt encryption functions; DES encryption and decryption test program and test result. 2016-01-02, 708👍, 1💬
Introduction to AES (Advanced Encryption Standard)
Tutorial notes and example codes on AES algorithms. Topics include introduction of AES (Advanced Encryption Standard); AES encryption algorithm; AES key schedule (round keys) algorithm and illustration example; MixColumns procedure algorithm; AES decryption algorithms. 2015-11-27, 228👍, 1💬
What is OFB (Output FeedBack) Operation Mode?
This section describes what is OFB (Output FeedBack) Operation Mode - each plaintext block is XORed with the current output block to be the ciphertext block. The current output block is the encrypted version of the previous output block. 2015-11-13, 962👍, 2💬
Converting Secret Keys to and from Byte Arrays
This section provides a quick introduction of the SecretKeySpec class and the KeySpec interface. They can be used to convert secret keys into byte arrays to store them in external files. 2015-11-03, 3779👍, 1💬
DES Key Schedule Algorithm Illustration Program Output
This section provides the execution output of the tutorial Java program, DESSubkeysTest.java, to illustrate how DES key schedule algorithm works. 2015-08-09, 1287👍, 1💬
Subkeys of 3DES Encryption
Hi Doc, I have subkeys recovered through DPA. Can 3DES.c be modified to accept these subkeys as inputs for a cryptographic operation? Alternatively, can the main 3DES key be reverse generated from the subkeys? Thanks. firstname.lastname@example.org 2015-07-23, 992👍, 1💬
This section describes the DSA (Digital Signature Algorithm) algorithm, which consists of 2 parts: g...
This section describes XML Tools Plugin, which provides a small set of useful tools for editing XML ...
This section provides a tutorial example on how to create and delete a program service with 'sc.exe'...
This section provides a tutorial Java program, CipherDES.java - A Java Implementation of DES encrypt...
This section provides a tutorial example on how to write a sample program to create a SSL client soc...