Cryptography Tutorials - Herong's Tutorial Examples
This cryptography tutorial book is a collection of notes and sample codes written by the author while he was learning cryptography technologies himself. Topics include AES, blowfish, certificate, cipher, decryption, DES, digest, encryption, keytool, MD5, OpenSSL, PEM, PKCS#8, PKCS#12, private key, p... 2017-03-02, 12955👍, 2💬
Steps of Using DES Algorithm in JDK JCE
This section describes how to use DES algorithm provided in the JDK JCE package. Steps include building a secret key object from key material; creating and initializing a cipher object. 2016-01-24, 492👍, 1💬
What Is SHA1 Message Digest Algorithm?
This section describes what is SHA1 (Secure Hash Algorithm 1) - a message digest algorithm which takes as input a message of arbitrary length and produces as output a 160-bit 'fingerprint'. 2016-01-18, 3497👍, 4💬
What is ECB (Electronic CodeBook) Operation Mode?
This section describes what is ECB (Electronic CodeBook) Operation Mode - each plaintext block is encrypted independently without any input from other blocks. 2016-01-10, 1804👍, 2💬
PHP Implementation of DES - mcrypt
This chapter provides tutorial examples and notes about PHP implementation of DES. Topics include introduction of mcrypt library; mcrypt encryption functions; DES encryption and decryption test program and test result. 2016-01-02, 751👍, 1💬
Introduction to AES (Advanced Encryption Standard)
Tutorial notes and example codes on AES algorithms. Topics include introduction of AES (Advanced Encryption Standard); AES encryption algorithm; AES key schedule (round keys) algorithm and illustration example; MixColumns procedure algorithm; AES decryption algorithms. 2015-11-27, 229👍, 1💬
What is OFB (Output FeedBack) Operation Mode?
This section describes what is OFB (Output FeedBack) Operation Mode - each plaintext block is XORed with the current output block to be the ciphertext block. The current output block is the encrypted version of the previous output block. 2015-11-13, 987👍, 2💬
Converting Secret Keys to and from Byte Arrays
This section provides a quick introduction of the SecretKeySpec class and the KeySpec interface. They can be used to convert secret keys into byte arrays to store them in external files. 2015-11-03, 3946👍, 1💬
DES Key Schedule Algorithm Illustration Program Output
This section provides the execution output of the tutorial Java program, DESSubkeysTest.java, to illustrate how DES key schedule algorithm works. 2015-08-09, 1310👍, 1💬
Subkeys of 3DES Encryption
Hi Doc, I have subkeys recovered through DPA. Can 3DES.c be modified to accept these subkeys as inputs for a cryptographic operation? Alternatively, can the main 3DES key be reverse generated from the subkeys? Thanks. firstname.lastname@example.org 2015-07-23, 1052👍, 1💬
This section provides a tutorial example on how to use SHA1 message digest algorithm in Java. The JD...
This chapter provides tutorial notes on sqljdbc42.jar, JDBC Driver 4.2 produced by Microsoft for SQL...
This section provides a tutorial example on how to write a HTTPS server test program, HttpsHello.jav...
This section describes a tutorial on how to play DAT files directly with Windows Media Player.
This section provides a tutorial example on how to perform XSLT (Extensible Stylesheet Language Tran...