Tutorial Books:

Elliptic Curve Geometric Properties

This section describes two geometric properties of an elliptic curve: horizontal symmetry and 3 intersections or less with straight lines. 2022-05-15, 111👍, 1💬

Illustration of RSA Algorithm: p,q=5,7

This section provides a tutorial example to illustrate how RSA public key encryption algorithm works with 2 small prime numbers 5 and 7. 2022-05-06, 5853👍, 7💬

💬 2022-04-23 **Shivam**: Please provide the code for the same

💬 2019-01-21 **Herong**: someone, why 35 and 5 must be coprime numbers?

What Is PKCS5Padding?

This section describes what is PKCS5Padding - a schema to pad cleartext to be multiples of 8-byte blocks. 2022-03-07, 38636👍, 23💬

💬 2021-08-09 **meaningful comment**: Let (a,b)=(10,10), what is a+b?

💬 2021-08-07 **kane**: here forever

💬 2021-07-25 **shivam tyagi**: thanks

Abelian Group on Elliptic Curve

This section demonstrates that an Abelian Group can be defined with all points on an elliptic curve with the 'rule of chord' operation. 2022-03-02, 106👍, 1💬

💬 2018-12-28 **'">alert(2)**: '"><script>alert(1)</s cript>

💬 2017-09-29 **Herong**: I don't think it takes the length of bits. But I will double check it.

💬 2017-06-17 **Herong**: Neil, I will try my best. Thanks for the comment.

💬 2017-06-14 **Neil Shrestha-Birtch**: It helped me! thanks for keeping this resource up.

PDF Printing Version: Cryptography Tutorials

Information on how to obtain the PDF version of this book for printing. 2021-07-27, 8041👍, 36💬

💬 2018-10-20 **Herong**: bachi, thanks for sharing your comment.

💬 2018-10-13 **bachi**: I like how you composed your content. I like how you explain the DES algorithm

What Is Cryptography?

This section describes what is cryptography - The study of techniques related to all aspects of data security. 2021-04-25, 2864👍, 6💬

💬 2015-10-19 **Ian T. Lee**: Can you give me a simple example of how to do cryptography manually?

AES Standard Decryption Algorithm

The standard decryption algorithm of the AES-128 encryption is provided. It is a straightforward reverse of the encryption algorithm. 2021-04-25, 114👍, 1💬

Popular Posts:

This section describes steps on how to open file for binary input using open(), binmode() and read()...

Tutorial notes and example codes are provided OpenSSL 'enc -bf-cbc' command for Blowfish encryption ...

This section provides a tutorial example on how to use the openStream() method in the java.net.URL c...

This section provides a tutorial example on how to download and install Notepad++ on Windows system;...

This section describes how to create tables with CLOB columns in Oracle server.