<< < 1 2 3 4 >   Sort: Rank

mcrypt DES Encryption Testing Program
This section provides a tutorial example on how to use the DES algorithm in a specific operation mode as block or stream cipher.
2017-08-03, 1114👍, 3💬

💬 2017-08-03 Herong: Deepan, Which part is difficult for you to understand?

💬 2017-07-27 Deepan: I can't understand

Visiting a "https" Web Site with Chrome
This section describes how Google Chrome 24 shows a lock icon when you visit an 'https' Web site to provide you more security related information.
2017-05-10, 277👍, 1💬

DsaSignatureGenerator.java - Generating DSA Digital Signature
This section provides tutorial example on how to generate a digital signature for a message file with a DSA private key using the SHA1withDSA algorithm.
2017-03-13, 4716👍, 5💬

💬 2017-03-13 dingdong: heheheheehhe

💬 2016-10-15 Herong: Akash, can you check to ensure your key is a DSA key?

💬 2016-10-14 Akash: Exception occurs as follows: java.security.spec.InvalidKeySpecExc eption:Inappropriate key specification what it means? can you ...

What Is Cryptography?
This section describes what is cryptography - The study of techniques related to all aspects of data security.
2017-02-18, 2527👍, 5💬

💬 2017-02-18 gabu: ggoodd

💬 2016-11-17 mohamed: yes

💬 2015-10-20 Herong: Hi Ian, the Rail Fence cipher is very simple example of encryption we can do manually. See the Transposition cipher page at wiki...

💬 2015-10-19 Ian T. Lee: Can you give me a simple example of how to do cryptography manually?

💬 2015-08-06 arnav: good

CipherDES.java - A Java Implementation of DES
This section provides a tutorial Java program, CipherDES.java - A Java Implementation of DES encryption and decryption algorithm.
2017-02-16, 11127👍, 9💬

💬 2017-02-16 Herong: Andro, I think implementation of DES using String methods will be slower than using byte and int operations.

💬 2017-02-12 Andro: Good done. I have created my own DES with benefits of string methods in Java. My DES receives binary string and key, then cipher...

💬 2016-03-03 Dede: Helps a lot, currently developping a mobile application that has to do with encryption. Thanks

💬 2015-10-16 Herong: Skip, Good luck on your study!

💬 2015-10-15 Skip: I'm taking a graduate course in cryptography and this was extremely helpful for going from DES visual to DES in java. I really a...

(More comments ...)

Viewing Certificate Path
This section provides a tutorial example on how to view certificate path when visiting an 'https' Web site in IE 9. The top certificate in a certificate path is the CA certificate, which is trusted automatically.
2017-01-31, 785👍, 1💬

💬 2017-01-31 kishor: -----BEGIN CERTIFICATE----- MIIDqjCCApICCQC6MOh9nHUvUjANBgkqhkiG 9w0BAQUFADCBljELMAkGA1UEBhMCVVMxETAPBgNVBAgTCENvbG9yYWRvMRMwEQY. ..

Using MD5 Message Digest in Java
This section provides a tutorial example on how to use MD5 message digest algorithm in Java. The JDK JCE package offers the MD5 algorithm through a generic message digest class, javax.security.MessageDigest.
2017-01-27, 137👍, 2💬

What is CFB (Cipher FeedBack) Operation Mode?
This section describes what is CFB (Cipher FeedBack) Operation Mode - each plaintext block is XORed with the encrypted version of the ciphertext of the previous block to be the ciphertext block.
2017-01-13, 1879👍, 3💬

💬 2016-12-07 fakhrulislam: i want a copy of this book !

💬 2015-11-06 poonam: a perfect explanation

RsaKeyGenerator.java for RSA Key Generation
This section describes the initial draft of a RSA public key and private key generation implementation using the java.math.BigInteger class.
2017-01-05, 2405👍, 2💬

💬 2017-01-05 Herong: Alex, you are right. q should be selected independently from p. I will make a change in the next revision.

💬 2016-12-28 Alex T.: Using nextProbablePrime() to compute q appears somewhat risky to me: An attacker with the knowledge of N=p*q could simply comput...

MD5 Message Digest Algorithm Overview
This section describes the MD5 algorithm - a 5-step process of padding of '1000...', appending message length, dividing as 512-bit blocks, initializing 4 buffers, and 4-round of hashing each block.
2016-11-21, 8837👍, 6💬

💬 2016-11-21 this is a burner: concise and accurate, thanks

💬 2016-09-26 brijesh gupta: its helpful

💬 2016-06-17 Ampera: Makasih

RSA Public Key Encryption Algorithm
This section describes the RSA public key encryption algorithm. Generating public and private keys used in RSA encryption requires two large prime numbers.
2016-11-21, 120👍, 1💬

DES Encryption Operation Modes
This chapter provides tutorial examples and notes about DES encryption operation modes. Topics include how different blocks of plaintext can be coupled together to improve the strength of the DES encryption algorithm; ECB (Electronic CodeBook), CBC (Cipher Block Chaining), CFB (Cipher FeedBack), and...
2016-11-12, 536👍, 1💬

💬 2016-11-12 kazim: very good webpage

SHA1 Mesasge Digest Algorithm
This chapter provides tutorial notes and example codes on the SHA1 message digest algorithm. Topics include SHA1 algorithm overview; using SHA1 in Java, PHP, and Perl.
2016-11-05, 1620👍, 5💬

💬 2015-10-14 Herong: Yojana, information on key generation of Blowfish Algorithm can be found in Key Schedule (Sub-Keys Generation) Algorithm tutoria...

💬 2015-10-13 Yojana Yadav: Plz send me the detail of key generation of Blowfish Algorithm

💬 2013-06-28 Herong: Abbas, You are welcome!

💬 2013-06-26 abbas: thank you for sha-1 and it's so helpful

"keytool" Importing CA's Own Certificate
This section provides a tutorial example on how to import CA's certificate generated by 'OpenSSL' into a 'keystore' file using 'keytool'
2016-10-20, 600👍, 2💬

💬 2016-10-20 Herong: Akhtar, AES256 encryption does not require any certificates. It requires a secret AES key, see Introduction to AES (Advanced Enc...

💬 2016-10-19 Akhtar: I have also a certificate file (.cer) .I did the same procedure to import in to mykey store and got .jks file but, now i want to...

What Is Block Cipher?
This section describes what is block cipher - An encryption scheme in which 'the clear text is broken up into blocks of fixed length, and encrypted one block at a time'.
2016-09-26, 335👍, 1💬

💬 2016-09-26 eva: soooooooo Amazing thank so much this site helping to learn about blowfish algorthm more

Blowfish Cipher Algorithm
This section describes the Blowfish cipher algorithm - A 16-round Feistel cipher with block size of 64 bits developed by Bruce Schneier in 1993.
2016-08-03, 754👍, 2💬

💬 2016-08-03 azi: fantastic

What Is PKCS5Padding?
This section describes what is PKCS5Padding - a schema to pad cleartext to be multiples of 8-byte blocks.
2016-06-16, 23014👍, 8💬

💬 2016-06-16 yo: hola pescado

💬 2016-04-04 ankit: this is me.

💬 2016-01-28 John: Herong, thanks a lot.

💬 2016-01-27 Herong: John, the schema of PKCS7Padding can be described as below: Pad the input at the trailing end with k−(l mod k) octets with the s...

💬 2016-01-24 John: For PKCS7Padding, what is the schema? I'm interested to what is after 0x0909090909090909099

(More comments ...)

"openssl pkcs8" Converting Keys to PKCS#8 Format
This section provides a tutorial example on how to convert a private key file from the traditional format into PKCS#8 format using the 'openssl pkcs8' command. Keys can still be encoded with DER or PEM with or without DES encryption in PKCS#8 format.
2016-04-12, 7450👍, 1💬

💬 2016-04-12 Nishant Desai: Does anyone knows any library by which i can execute openssl pkcs8 -topk8 -in openssl_key.pem -inform pem -out openssl_key_pk8_e...

Certificate X.509 Standard and DER/PEM Formats
This chapter provides tutorial notes and example codes on certificate content standard and file formats. Topics include X.509 standard for certificate content; DER encoding for certificate binary file format; PEM encoding for certificate text file format; exchanging certificates in DER and PEM forma...
2016-04-10, 130👍, 1💬

Summary - Migrating "keystore" Keys to "OpenSSL"
This section describes high level steps on how to migrate a private key generated in a JKS (Java KeyStore) file to an 'OpenSSL' key file. The key step is to convert a JKS file into a PKCS#12 file with 'keytool'.
2016-04-09, 102👍, 1💬

Cryptography Basic Concepts
This chapter describes some basic concepts of cryptography: what is cryptography, what is function and what is encryption.
2016-04-07, 2470👍, 4💬

💬 2016-02-03 dinesh: thanks

💬 2015-12-28 Herong: Malini, RSA is good example of cryptosystem. Read Introduction of RSA Algorithm for more information.

💬 2015-12-28 malini: need cryptosystem

Certificate in PEM Format
This section describes what is certificate PEM (Privacy Enhanced Mail) format - A format uses PEM idea to convert a certificate in DER format to a message of printable characters. The conversion uses the Base64 encoding.
2016-03-30, 4334👍, 2💬

💬 2016-03-30 Herong: Bcbin, why don't you post your question here? Maybe others can help you too. Or send me an email directly.

💬 2016-03-27 bcbin: my name is bcbin, my email is bcbin@yahoo.com. please connecting me. i need you help ):

Key Schedule (Sub-Keys Generation) Algorithm
This section describes the Blowfish Key Schedule (Sub-Keys Generation) algorithm. It uses the binary representation of the fractional portion of constant Pi - 3.1415927... as initial values.
2016-03-17, 1243👍, 2💬

💬 2016-03-17 Herong: Hi Yogita, Blowfish(T) function refers the Blowfish algorithm described in the previous tutorial: Blowfish Cipher Algorithm.

💬 2016-03-16 YOGITA: what is the function blowfish(T) here? Send the pseudo code

Viewing Components of RSA Keys
This section provides a tutorial example on how to view different components of a pair of RSA private key and public key using the OpenSSL command line tool.
2016-03-14, 2016👍, 2💬

💬 2015-10-02 Herong: Looks like someone is testing Base64 encoding here :-)

💬 2015-10-01 1: CSENry/M1h2AhxGSxQluy4b1ynzBGWeO320C AwEAAQJAbQQn... IQCoo0AdFXm789FfHuB+mVIKNtBLTAQNaMuX z6lXl7Ib7Q==

<< < 1 2 3 4 >   Sort: Rank