Popular Books:
💬 2016-10-17 Deepak: Working on Algorithm
💬 2015-10-04 Herong: Salai, you are most welcome.
💬 2015-10-02 Salai Joy Siang Pi: Thank you so much. It's very helpful for my mini-thesis.
Cryptography Terminology
This section provides descriptions on some commonly used cryptography terminologies 2019-02-18, ∼3447🔥, 2💬
💬 2019-02-18 Hh: <body bgcolor="red">
💬 2015-10-24 dexter aparicio: this site is my favorite reference on cryptography topics
Cryptography Basic Concepts
This chapter describes some basic concepts of cryptography: what is cryptography, what is function and what is encryption. 2016-04-07, ∼3424🔥, 4💬
"brainpoolP256r1"“ - For 256-Bit ECC Keys
This section describes 'brainpoolP256r1' elliptic curve domain parameters for generating 256-Bit ECC Keys as specified by RFC 5639. 2022-10-01, ∼3370🔥, 0💬
What Is ECDH Key Exchange
This section introduces what is ECDH Key Exchange - a protocol that uses the Elliptic Curve group property to establish a shared secret key without sending it directly to each other. 2023-11-09, ∼3338🔥, 3💬
What Is Cryptography?
This section describes what is cryptography - The study of techniques related to all aspects of data security. 2021-04-25, ∼3313🔥, 6💬
💬 2015-10-19 Ian T. Lee: Can you give me a simple example of how to do cryptography manually?
DES Key Schedule Algorithm Illustration Program Output
This section provides the execution output of the tutorial Java program, DESSubkeysTest.java, to illustrate how DES key schedule algorithm works. 2015-08-09, ∼2581🔥, 1💬
SHA1 Mesasge Digest Algorithm
This chapter provides tutorial notes and example codes on the SHA1 message digest algorithm. Topics include SHA1 algorithm overview; using SHA1 in Java, PHP, and Perl. 2016-11-05, ∼2387🔥, 5💬
💬 2015-10-13 Yojana Yadav: Plz send me the detail of key generation of Blowfish Algorithm
Key Pair Sample Program - JcaKeyPair.java
This section provides a tutorial example on how to write simple program to generate a pair of private key and public key for the RSA or DSA algorithm. 2016-03-01, ∼2114🔥, 1💬
mcrypt DES Encryption Testing Program
This section provides a tutorial example on how to use the DES algorithm in a specific operation mode as block or stream cipher. 2017-08-03, ∼1861🔥, 3💬
💬 2017-08-03 Herong: Deepan, Which part is difficult for you to understand?
💬 2023-06-05 Daniel: I don't understand how to assign key for plaintext
💬 2016-03-16 YOGITA: what is the function blowfish(T) here? Send the pseudo code
Generating New RSA Key Pairs
This section provides a tutorial example on how to generate a new pair of RSA priviate key and public key using the OpenSSL command line tool. 2015-11-03, ∼1639🔥, 1💬
DESSubkeysTest.java - DES Key Schedule Algorithm Illustration
This section provides a tutorial Java program, DESSubkeysTest.java, to illustrate how DES key schedule algorithm works. 2020-02-10, ∼1627🔥, 3💬
Example Vector of AES Encryption
An example vector of AES-128 encryption is presented. Round keys and state values of all 11 rounds are included to help users to verify their AES implementation. 2019-02-24, ∼1616🔥, 1💬
64-bit RSA Key Validated by RsaKeyValidator.java
This section provides a tutorial example on how a 64-bit RSA key is validated by RsaKeyValidator.java with 3 rounds of encryption and decryption tests. 2023-03-05, ∼1580🔥, 3💬
💬 2018-06-09 Herong: Adrian, you are welcome!
💬 2018-06-09 Adrian: I needed in rush working 64-bit keys. You helped me a lot. Thanks! :D
Popular Posts:
This section provides a tutorial example on how to detect Java thread deadlocks with the thread stac...
I thought I'd share something that came from a talk I gave not long ago when I was asked just what a...
This section describes what is SHA1 (Secure Hash Algorithm 1) - a message digest algorithm which tak...
This section provides a tutorial example on how to create and delete a program service with 'sc.exe'...
"Reservation" is an XML document based Web service for testing purpose only. High level information ...