Popular Books:
Importing CA Certificate into Firefox
This section provides a tutorial example on how to import a CA certificate into Firefox in the 'Authorities' category. 2025-06-18, ∼512🔥, 1💬
First 8336 Hex Digits of PI
This section provides first 8336 hex digits of constant PI, 3.1415927..., needed for Blowfish encryption algorithm. 2025-04-28, ∼8084🔥, 13💬
💬 2019-04-28 Herong: 8336 Hex Digits. Thanks.
💬 2019-04-26 Harry: Do you mean 8336 digits
💬 2024-04-23 ☺: meaningful comments. Thanks! ☺
💬 2022-12-02 Victor: meaningful comments.
Full Version in PDF/EPUB
Information on how to obtain the full version of this book in PDF, EPUB, or other format. 2024-03-13, ∼9212🔥, 37💬
💬 2018-10-20 Herong: bachi, thanks for sharing your comment.
💬 2018-10-13 bachi: I like how you composed your content. I like how you explain the DES algorithm
What Is PKCS5Padding?
This section describes what is PKCS5Padding - a schema to pad cleartext to be multiples of 8-byte blocks. 2024-01-31, ≈50🔥, 38💬
💬 2023-04-12 {"partnerReferenceNo": "APP12345: ok
💬 2023-01-18 Servant of Elon Musk's Regent: You are the chosen one!
💬 2022-11-17 Elon Musk's Regent: mommy
💬 2022-11-14 Elon Musk: Giving away twitter to the first person to reply and call me mommy
What is ECB (Electronic CodeBook) Operation Mode?
This section describes what is ECB (Electronic CodeBook) Operation Mode - each plaintext block is encrypted independently without any input from other blocks. 2024-01-29, ∼5830🔥, 5💬
💬 2020-10-18 Herong: donjo, there is no real applications that use the ECB mode.
💬 2020-10-16 donjo dumdum: What is application of ECB mode operation
Viewing Components of Certificate Signing Request
This section provides a tutorial example on how to view different components of a CSR (Certificate Signing Request) for your public key with OpenSSL. 2023-12-17, ∼872🔥, 5💬
Encrypting RSA Keys
This section provides a tutorial example on how to store RSA keys encrypted with password protection. 2023-12-12, ∼527🔥, 1💬
Full Version in PDF/EPUB
Information on how to obtain the full version of this book in PDF, EPUB, or other format. 2023-12-06, ∼616🔥, 2💬
Illustration of DSA Algorithm: p,q=23,11
This section provides a tutorial example to illustrate how DSA digital signature algorithm works with small prime modulus p=23 and prime divisor q=11. 2023-11-19, ∼6439🔥, 10💬
What Is ECDH Key Exchange
This section introduces what is ECDH Key Exchange - a protocol that uses the Elliptic Curve group property to establish a shared secret key without sending it directly to each other. 2023-11-09, ∼3302🔥, 3💬
"secp256r1" - For 256-Bit ECC Keys
This section describes 'secp256r1' elliptic curve domain parameters for generating 256-Bit ECC Keys as specified by secg.org. 2023-10-20, ∼4977🔥, 1💬
RSA Public Key Encryption Algorithm
This section describes the RSA public key encryption algorithm. Generating public and private keys used in RSA encryption requires two large prime numbers. 2023-10-16, ∼353🔥, 2💬
💬 2023-10-16 subbarao: thanks for giving wonderful knowledge
Popular Posts:
This section describes what is cryptography - The study of techniques related to all aspects of data...
中国生物新冠疫苗是什么时候开始研发的?什么时候获 批的?中国生物新冠疫苗从立项到研发、建设、生产、上市, 只用了33...
This chapter provides tutorial notes on the native-to-ASCII encoding converter 'native2ascii'. Topic...
This section provides a tutorial example on how to build a new XML document with Python xml.dom.mini...
This section describes how to create a DSN that connected to a MS Access database file.