XML Tutorials - Herong's Tutorial Examples
This XML tutorial book is a collection of notes and sample codes written by the author while he was learning XML himself. Topics include introduction to XML, DTD (Document Type Definition), XSD (XML Schema Definition), XPath (XML Path Language), XSL (Extensible Stylesheet Language), XSLT (XSL Transf... 2022-05-06, 10129👍, 3💬
tinyec - Python Library for ECC
This chapter provides tutorial notes on 'tinyec' Python library for ECC. Topics include installing 'tinyec'; creating ec.Curve objects, performing point addition and scalar multiplication. 2022-05-16, 112👍, 2💬
What Is an Elliptic Curve?
This section describes what is elliptic curve - A set of 2 dimensional points of (x, y) that satisfy the y*y = x*x*x + a*x + b equation with given values of a and b. 2022-05-15, 107👍, 1💬
EC Cryptography Tutorials - Herong's Tutorial Examples
This EC (Elliptic Curve) cryptography tutorial book is a collection of notes and sample codes written by the author while he was learning cryptography technologies himself. Topics include rule of chord and point addition on elliptic curves; Abelian groups with additive/multiplicative notations; EC a... 2022-05-15, 2766👍, 5💬
ECES (Elliptic Curve Encryption Scheme)
This chapter provides tutorial notes on ECES (Elliptic Curve Encryption Schema). Topics includes ECES plaintext encryption and ciphertext decryption processes; using Crypto.Cipher.AES module to test ECES. 2022-05-06, 117👍, 1💬
What Is DER (Distinguished Encoding Rules) Encoding?
This section describes the DER (Distinguished Encoding Rules) - A binary format of encoding a data value of any data types including nested data structures. 2022-05-06, 19942👍, 8💬
How Secure Is RSA Algorithm?
This section discusses the security of RSA public key encryption algorithm. RSA private key is not 100% secure. But if the private key uses larger value of n = p*q, it will take a very long time to crack the private key. 2022-04-12, 2155👍, 5💬
Cleartext Block Size for RSA Encryption
This section discusses what is the most efficient block size when dividing a Cleartext message into blocks for RSA public encryption. The suggested block size is 'floor((x-1)/8)', where 'x' is the RSA key size, or the key modulus bit length. 2022-03-29, 587👍, 3💬
"openssl pkcs8" Converting Keys to PKCS#8 Format
This section provides a tutorial example on how to convert a private key file from the traditional format into PKCS#8 format using the 'openssl pkcs8' command. Keys can still be encoded with DER or PEM with or without DES encryption in PKCS#8 format. 2022-03-08, 13510👍, 2💬
PHP Implementation of DES - mcrypt
This chapter provides tutorial examples and notes about PHP implementation of DES. Topics include introduction of mcrypt library; mcrypt encryption functions; DES encryption and decryption test program and test result. 2022-02-24, 2648👍, 5💬
Blowfish - 8-Byte Block Cipher
This chapter provides tutorial examples and notes about Blowfish block cipher. Topics include Blowfish encryption and decryption algorithm; Blowfish sub-key generation schema, Blowfish algorithm implementation in Java. 2022-02-05, 515👍, 2💬
Certificate in PEM Format
This section describes what is certificate PEM (Privacy Enhanced Mail) format - A format uses PEM idea to convert a certificate in DER format to a message of printable characters. The conversion uses the Base64 encoding. 2021-12-27, 10250👍, 6💬
SHA1 Message Digest Algorithm Overview
This section describes the SHA1 algorithm - a 6-step process of padding of '1000...', appending message length, preparing 80 process functions, preparing 80 constants, preparing 5 word buffers, processing input in 512 blocks. 2021-10-25, 15410👍, 8💬
Subkeys of 3DES Encryption
Hi Doc, I have subkeys recovered through DPA. Can 3DES.c be modified to accept these subkeys as inputs for a cryptographic operation? Alternatively, can the main 3DES key be reverse generated from the subkeys? Thanks. firstname.lastname@example.org 2021-10-15, 6316👍, 2💬
MD5 Message Digest Algorithm Overview
This section describes the MD5 algorithm - a 5-step process of padding of '1000...', appending message length, dividing as 512-bit blocks, initializing 4 buffers, and 4-round of hashing each block. 2021-10-04, 11790👍, 7💬
"OpenSSL" Generating CA's Private Key
This section provides a tutorial example on how to use OpenSSL to generate a RSA private key of 2048 bit long with OpenSSL. This key will be used as the CA's private key and must stored securely in a file with password protection. 2021-09-24, 5672👍, 2💬
Cryptography Tutorials - Herong's Tutorial Examples
This cryptography tutorial book is a collection of notes and sample codes written by the author while he was learning cryptography technologies himself. Topics include AES, blowfish, certificate, cipher, decryption, DES, digest, encryption, keytool, MD5, OpenSSL, PEM, PKCS#8, PKCS#12, private key, p... 2021-08-28, 33220👍, 7💬
"keytool" and "keystore" from JDK
This chapter provides tutorial notes and example codes on 'keytool' and 'keystore'. Topics include introduction of 'keytool' and 'keystore'; using 'keytool' to generate private keys, generate self-signed certificates, export and import certificates. 2021-04-23, 260👍, 1💬
This section describes steps on how to open file for binary input using open(), binmode() and read()...
Tutorial notes and example codes are provided OpenSSL 'enc -bf-cbc' command for Blowfish encryption ...
This section provides a tutorial example on how to use the openStream() method in the java.net.URL c...
This section provides a tutorial example on how to download and install Notepad++ on Windows system;...
This section describes how to create tables with CLOB columns in Oracle server.