<< < 4 5 6 7 8 9 10 11 12 13 14 > >>   ∑:342  Sort:Date

Viewing Certificate Details
This section provides a tutorial example on how to view certificate details when visiting an 'https' Web site in Firefox.
2022-10-04, ∼296🔥, 0💬

What Are Standard Elliptic Curves
This section provides a list of standard elliptic curves selected and recommended by different organizations to generate secure EC private-pubic key pairs.
2022-10-01, ∼296🔥, 0💬

"DumpKey.java" Dumping Private Keys Out of "keystore"
This section provides a tutorial example on how to dump private key and public key pair output of a 'PrivateKeyEntry' in a 'keystore' file using a Java program, DumpKey.java.
2022-10-05, ∼294🔥, 0💬

Algebraic Description of Elliptic Curve Addition
This section provides an algebraic description of the problem of calculating the addition operation defined on an elliptic curve.
2022-10-01, ∼294🔥, 0💬

What Is Discrete Logarithm Problem (DLP)
This section describes what is Discrete Logarithm Problem (DLP), which is the reverse operation of an exponentiation (or scalar multiplication) operation in an Abelian group.
2022-10-01, ∼292🔥, 0💬

Algebraic Solution for Point Doubling
This section provides an algebraic solution for calculating the addition operation of two points at the same location on an elliptic curve.
2022-10-01, ∼290🔥, 0💬

Scalar Multiplication or Exponentiation
This section describes what is Scalar Multiplication or Exponentiation in Abelian Groups. They are used represent the process of performing Abelian Group operations consecutively n times with the same element.
2022-10-01, ∼284🔥, 0💬

Terminology
List of terms used in this book.
2022-10-01, ∼282🔥, 0💬

Additive Notation of Abelian Group
This section describes the Additive notation of an Abelian Group. The addition sign, +, is used as the operator. Number 0 is used as the identity element.
2022-10-01, ∼281🔥, 0💬

Java Default Implementation of DSA
This chapter provides tutorial notes and example codes on the Java default implementation of DSA (Digital Signature Algorithm). Generating DSA key pair in Java; Examples of public key and private key pairs; Checking DSA key parameter; Generating DSA digital signature in Java using SHA1withDSA; Verif...
2022-10-13, ∼280🔥, 0💬

What Is Abelian Group
This section describes Abelian Group, which a set of elements with a binary operation satisfing 5 conditions.
2022-10-01, ∼280🔥, 0💬

RsaKeyEncryption.java for RSA Encryption Operation
This section provides a tutorial example on how to implement RSA encryption operation using the java.math.BigInteger class. The important part of the implementation is to determine the cleartext block size, ciphertext block size, and the padding of the last block.
2022-12-15, ∼276🔥, 1💬

PKCS#8 and X.509 Key Encoding Classes
This section describes 2 JDK classes: PKCS8EncodedKeySpec representing the PKCS#8 encoding standard and the X.509 encoding standard.
2022-10-05, ∼276🔥, 0💬

Set Subgroup Order to Higher Value
This section provides a tutorial example on how to set the subgroup order a value greater than the order of the entire group, like 2 times of the modulo, to ensure correct result of scalar multiplications.
2022-10-01, ∼275🔥, 0💬

Modular Multiplication of 11 - Abelian Group
This section provides an Abelian Group using the modular arithmetic multiplication of 11 (integer multiplication operation followed by a modular reduction of 11).
2022-10-01, ∼273🔥, 0💬

What Is Subgroup in Abelian Group
This section describes Subgroups in a Abelian Group. A subgroup in a Abelian Group is a subset of the Abelian Group that itself is an Abelian Group. The subgroup and its parent group are using the same operation.
2022-10-01, ∼265🔥, 0💬

OpenSSL Generating and Managing RSA Keys
This chapter provides tutorial notes and example codes on managing RSA keys with OpenSSL. Topics include generating new RSA keys; viewing existing RSA keys; encrypting RSA keys with DES algorithm to protect them with passwords.
2025-02-21, ∼261🔥, 1💬

💬 2025-02-21 bz: good for helping me

Secret Key Generation and Management
This chapter provides tutorial notes and example codes on secret keys. Topics include secret keys for Blowfish, DES, or HmacMD5 encryption algorithms; key generator class; test program to generate secret keys and save them in files.
2025-01-29, ∼261🔥, 1💬

mcrypt Encryption Functions
This section describes mcrypt encryption functions and 4 DES ciphers (operation modes) - 8-byte ECB, 8-byte CBC, 1-byte CFB, and 1-byte OFB ciphers.
2023-02-28, ∼261🔥, 1💬

💬 2023-02-28 adry: password

Converting Elliptic Curve Groups
This section describes steps on how to convert real number elliptic curve groups to cyclic subgroups of integer elliptic curve groups.
2022-10-01, ∼261🔥, 0💬

OFB (Output FeedBack) as a Stream Cipher
This section describes how DES OFB (Output FeedBack) operation mode can be modified as a 1-bit stream cipher or a 1-byte stream cipher.
2022-10-04, ∼260🔥, 0💬

EC Curves Supported by Java
This section provides is a list of named curves that are supported or not supported by 'keytool' and Java default library.
2022-10-01, ∼260🔥, 0💬

Archived Tutorials
This chapter contains some outdated tutorial notes and example codes from previous versions of this book.
2022-10-06, ∼259🔥, 0💬

Prove of Elliptic Curve Addition Operation
This section describes how to prove that the addition operation on an elliptic curve can be successfully performed geometrically.
2022-10-01, ∼256🔥, 0💬

<< < 4 5 6 7 8 9 10 11 12 13 14 > >>   ∑:342  Sort:Date