<< < 1 2 3 4 5 6 7 8 9 10 > >>   ∑:342  Sort:Date

Download and Install tinyec
This section describes how to install tinyec, which can be done by running the 'pip install tinyec' command.
2022-10-01, ∼922🔥, 0💬

java.security.KeyFactory - Reading Encoded Keys
This section describes the java.security.KeyFactory class, which allows you to convert key spec objects back to key objects. Full process of reading and converting encoded key files back to key objects are also provided.
2019-03-23, ∼904🔥, 2💬

💬 2019-03-23 Herong: See the next tutorial " JcaKeyFactoryTest.java - Key Factory Test Program " for code samples.

💬 2019-03-13 wubba lubba dub dub: code samples along with this would've been helpful

What Is tinyec
This section introduces what is tinyec - a tiny library to perform arithmetic operations on elliptic curves in pure Python.
2021-03-02, ∼884🔥, 1💬

Viewing Components of Certificate Signing Request
This section provides a tutorial example on how to view different components of a CSR (Certificate Signing Request) for your public key with OpenSSL.
2023-12-17, ∼880🔥, 5💬

💬 2023-12-17 Herong: NB, Thanks for your comments. I see the value of signing the CSR now and will update the book accordingly.

💬 2023-12-15 NB: Your CSR does not contain your private key. It contains your public key and information about the domain(s) for which it should ...

💬 2014-03-29 Herong: Hi Mike, Sorry for the inconvenience. HTML tags are supported, but they are limited to admin users only to reduce spamming and h...

💬 2014-03-23 Mike: Wow. What a waste of time trying to make a legible comment post. No instructions on how to get a paragraph break, include a angl...

💬 2014-03-23 Mike: You made a note in "Viewing Components of Certificate Signing Request" where you said, "The request is signed with my private ke...

Proof of DSA Digital Signature Algorithm
This section describes steps to prove DSA digital signature algorithm. Fermat's little theorem is the key part of the proof.
2022-10-04, ∼868🔥, 0💬

Geometric Introduction to Elliptic Curves
This chapter provides a geometric introduction of elliptic curves and the associated addition operation. Topics includes what is an elliptic curve and its geometric properties; geometric algorithm defining an addition operation; infinity point or identity element; commutativity and associativity of ...
2023-10-11, ∼864🔥, 2💬

💬 2020-09-12 NA: NA

Java Program to Generate EC Keys
This section provides a tutorial example on how to write a Java program to generate EC private-public key pairs.
2022-10-01, ∼854🔥, 0💬

CFB (Cipher FeedBack) as a Stream Cipher
This section describes how DES CFB (Cipher FeedBack) operation mode can be modified as a 1-bit stream cipher or a 1-byte stream cipher.
2022-03-10, ∼832🔥, 2💬

"keytool" and "keystore" from JDK
This chapter provides tutorial notes and example codes on 'keytool' and 'keystore'. Topics include introduction of 'keytool' and 'keystore'; using 'keytool' to generate private keys, generate self-signed certificates, export and import certificates.
2021-04-23, ∼828🔥, 1💬

💬 2021-04-23 chanho.song: wow. I'm Korean. Thank u so much.

Elliptic Curve Point Doubling Example
This section provides algebraic calculation example of point doubling, adding a point to itself, on an elliptic curve.
2022-10-01, ∼825🔥, 0💬

Elliptic Curve Geometric Properties
This section describes two geometric properties of an elliptic curve: horizontal symmetry and 3 intersections or less with straight lines.
2022-05-15, ∼770🔥, 1💬

"keytool" Viewing Certificates in DER and PEM
This section provides a tutorial example on how to use 'keytool' to view certificates in DER and PEM formats generated by 'OpenSSL'.
2022-10-04, ∼763🔥, 0💬

"openssl genrsa" Generating Private Key
This section provides a tutorial example on how to generate a RSA private key with the 'openssl genrsa' command. The key file can be then converted to DER or PEM encoding with or without DES encryption.
2022-10-04, ∼761🔥, 0💬

AES Equivalent Decryption Algorithm
The equivalent decryption algorithm of the AES-128 encryption is provided. It follows the same sequence of applying transformation procedures as the encryption algorithm, but uses modified round keys.
2025-06-08, ∼741🔥, 2💬

Infinity Point on an Elliptic Curve
This section describes how the infinity point is used to represent the intersection of vertical lines and elliptic curves.
2022-10-01, ∼738🔥, 0💬

DsaKeyGenerator.java - Generating DSA Key Pair
This section provides a tutorial example on how to using the Java default implementation of DSA (Digital Signature Algorithm) to generate DSA key pair, public key and private key.
2023-01-10, ∼689🔥, 1💬

💬 2023-01-10 Dontien: The tutorial was helpfull

"keytool -importkeystore" Importing PKCS#12 Files
This section provides a tutorial example on how to import a private key stored in a PKCS#12 file into a JKS (Java KeyStore) file with the 'keytool -importkeystore' command.
2022-10-04, ∼687🔥, 0💬

ECDH (Elliptic Curve Diffie-Hellman) Key Exchange
This chapter provides tutorial notes on ECDH key exchange protocol, which is to perform a scalar multiplication of one's own EC private key and other's EC public key to obtain the common shared secret key.
2022-10-01, ∼673🔥, 0💬

Identity Element on an Elliptic Curve
This section describes the 'identity element', which is the 'infinity point' in our addition and subtraction operations on an elliptic curve.
2022-10-01, ∼659🔥, 0💬

Full Version in PDF/EPUB
Information on how to obtain the full version of this book in PDF, EPUB, or other format.
2023-12-06, ∼642🔥, 2💬

💬 2023-12-06 Herong: Devang, can you send me your order information to me at herong_yang@yahoo.com? Thanks.

💬 2023-12-05 Devang: I purchased the book from amazon a d sent the mail with order details but did not receive book in pdf format. Could you please c...

"brainpoolP256t1"“ - For 256-Bit ECC Keys
This section describes 'brainpoolP256t1' elliptic curve domain parameters for generating 256-Bit ECC Keys as specified by RFC 5639.
2022-10-01, ∼642🔥, 0💬

What Is Block Cipher?
This section describes what is block cipher - An encryption scheme in which 'the clear text is broken up into blocks of fixed length, and encrypted one block at a time'.
2016-09-26, ∼641🔥, 1💬

💬 2016-09-26 eva: soooooooo Amazing thank so much this site helping to learn about blowfish algorthm more

Perform Point Addition with tinyec
This section provides a tutorial example on how to perform the point addition operation on a given elliptic curve with tinyec Python library.
2022-10-01, ∼635🔥, 0💬

What Is PKCS#8?
This section describes what is PKCS#8 - One of the PKCS (Public Key Cryptography Standards) used to store a single private key. A PKCS#8 file can be encrypted with a password to protect the private key.
2023-11-15, ∼620🔥, 4💬

<< < 1 2 3 4 5 6 7 8 9 10 > >>   ∑:342  Sort:Date