<< < 4 5 6 7 8 9 10 11 12 13 14 > >>   ∑:342  Sort:Date

Scalar Multiplication on Elliptic Curve as Trapdoor Function
This section confirms that Scalar Multiplication on Elliptic Curve is a good Trapdoor Function by the comparing difficulty level against its reverse operation, which is the DLP.
2022-10-01, ∼324🔥, 0💬

What Are Standard Elliptic Curves
This section provides a list of standard elliptic curves selected and recommended by different organizations to generate secure EC private-pubic key pairs.
2022-10-01, ∼324🔥, 0💬

"DumpKey.java" Dumping Private Keys Out of "keystore"
This section provides a tutorial example on how to dump private key and public key pair output of a 'PrivateKeyEntry' in a 'keystore' file using a Java program, DumpKey.java.
2022-10-05, ∼323🔥, 0💬

What Is Discrete Logarithm Problem (DLP)
This section describes what is Discrete Logarithm Problem (DLP), which is the reverse operation of an exponentiation (or scalar multiplication) operation in an Abelian group.
2022-10-01, ∼323🔥, 0💬

Associativity of Elliptic Curve Operations
This section describes the associativity of the addition operation on an elliptic curve. P + (Q + S) = (P + Q) + S is true.
2022-10-01, ∼319🔥, 0💬

Java Default Implementation of DSA
This chapter provides tutorial notes and example codes on the Java default implementation of DSA (Digital Signature Algorithm). Generating DSA key pair in Java; Examples of public key and private key pairs; Checking DSA key parameter; Generating DSA digital signature in Java using SHA1withDSA; Verif...
2022-10-13, ∼315🔥, 0💬

Archived Tutorials
This chapter contains some outdated tutorial notes and example codes from previous versions of this book.
2022-10-06, ∼315🔥, 0💬

OFB (Output FeedBack) as a Stream Cipher
This section describes how DES OFB (Output FeedBack) operation mode can be modified as a 1-bit stream cipher or a 1-byte stream cipher.
2022-10-04, ∼310🔥, 0💬

Scalar Multiplication or Exponentiation
This section describes what is Scalar Multiplication or Exponentiation in Abelian Groups. They are used represent the process of performing Abelian Group operations consecutively n times with the same element.
2022-10-01, ∼310🔥, 0💬

References
List of reference materials used in this book.
2022-10-01, ∼309🔥, 0💬

Additive Notation of Abelian Group
This section describes the Additive notation of an Abelian Group. The addition sign, +, is used as the operator. Number 0 is used as the identity element.
2022-10-01, ∼306🔥, 0💬

Set Subgroup Order to Higher Value
This section provides a tutorial example on how to set the subgroup order a value greater than the order of the entire group, like 2 times of the modulo, to ensure correct result of scalar multiplications.
2022-10-01, ∼306🔥, 0💬

Terminology
List of terms used in this book.
2022-10-01, ∼305🔥, 0💬

OpenSSL Generating and Managing RSA Keys
This chapter provides tutorial notes and example codes on managing RSA keys with OpenSSL. Topics include generating new RSA keys; viewing existing RSA keys; encrypting RSA keys with DES algorithm to protect them with passwords.
2025-02-21, ∼304🔥, 1💬

💬 2025-02-21 bz: good for helping me

Algebraic Solution for Point Doubling
This section provides an algebraic solution for calculating the addition operation of two points at the same location on an elliptic curve.
2022-10-01, ∼304🔥, 0💬

What Is Subgroup in Abelian Group
This section describes Subgroups in a Abelian Group. A subgroup in a Abelian Group is a subset of the Abelian Group that itself is an Abelian Group. The subgroup and its parent group are using the same operation.
2022-10-01, ∼299🔥, 0💬

mcrypt Encryption Functions
This section describes mcrypt encryption functions and 4 DES ciphers (operation modes) - 8-byte ECB, 8-byte CBC, 1-byte CFB, and 1-byte OFB ciphers.
2023-02-28, ∼296🔥, 1💬

💬 2023-02-28 adry: password

RsaKeyEncryption.java for RSA Encryption Operation
This section provides a tutorial example on how to implement RSA encryption operation using the java.math.BigInteger class. The important part of the implementation is to determine the cleartext block size, ciphertext block size, and the padding of the last block.
2022-12-15, ∼293🔥, 1💬

What Is a Certification Path?
This section describes what is a certificate path or certificate chain - An ordered list of certificates where the subject entity of one certificate is identical to the issuing entity of the next certificate.
2022-10-05, ∼293🔥, 0💬

Modular Multiplication of 11 - Abelian Group
This section provides an Abelian Group using the modular arithmetic multiplication of 11 (integer multiplication operation followed by a modular reduction of 11).
2022-10-01, ∼293🔥, 0💬

What Is Key Encoding?
This section describes private and public key encoding standards: PKCS#8 is used for encoding private keys and X.509 is used for encoding public keys.
2022-10-06, ∼291🔥, 0💬

Elliptic Curve Operation Summary
This section provides a summary of elliptic curve operations and their properties discussed in this chapter.
2022-10-01, ∼291🔥, 0💬

What Is Abelian Group
This section describes Abelian Group, which a set of elements with a binary operation satisfing 5 conditions.
2022-10-01, ∼291🔥, 0💬

"openssl dsa" Viewing Private and Public Key Pair
This section provides a tutorial example on how to view a private and public key pair stored in PEM format using the 'openssl dsa' command. The key pair was originally generated by the 'keytool -genkeypair' command.
2022-10-04, ∼289🔥, 0💬

<< < 4 5 6 7 8 9 10 11 12 13 14 > >>   ∑:342  Sort:Date