XML Tutorials - Herong's Tutorial Examples
This XML tutorial book is a collection of notes and sample codes written by the author while he was learning XML himself. Topics include introduction to XML, DTD (Document Type Definition), XSD (XML Schema Definition), XPath (XML Path Language), XSL (Extensible Stylesheet Language), XSLT (XSL Transf... 2021-03-07, 8945👍, 2💬
"keytool" and "keystore" from JDK
This chapter provides tutorial notes and example codes on 'keytool' and 'keystore'. Topics include introduction of 'keytool' and 'keystore'; using 'keytool' to generate private keys, generate self-signed certificates, export and import certificates. 2021-04-23, 127👍, 1💬
How Secure Is RSA Algorithm?
This section discusses the security of RSA public key encryption algorithm. RSA private key is not 100% secure. But if the private key uses larger value of n = p*q, it will take a very long time to crack the private key. 2021-03-03, 1856👍, 3💬
Illustration of DSA Algorithm: p,q=23,11
This section provides a tutorial example to illustrate how DSA digital signature algorithm works with small prime modulus p=23 and prime divisor q=11. 2021-01-09, 1040👍, 6💬
What Is DSA (Digital Signature Algorithm)?
This section describes the DSA (Digital Signature Algorithm) algorithm, which consists of 2 parts: generation of a pair of public key and private key; generation and verification of digital signature. 2021-01-08, 31468👍, 17💬
Converting Secret Keys to and from Byte Arrays
This section provides a quick introduction of the SecretKeySpec class and the KeySpec interface. They can be used to convert secret keys into byte arrays to store them in external files. 2020-11-23, 12350👍, 5💬
DES Algorithm Java Implementation
This chapter provides tutorial examples and notes about DES algorithm implementation in Java language. Topics include an example Java implementation of DES encryption and decryption algorithm; test cases of single block cleartext and ciphertext. 2020-11-11, 7223👍, 17💬
EC Private and Public Key Pair
This section introduces what is EC (Elliptic Curve) key pair - a pair of private key and public key constructed from a given subgroup generator in a given elliptic curve group. 2020-11-07, 205👍, 1💬
What is ECB (Electronic CodeBook) Operation Mode?
This section describes what is ECB (Electronic CodeBook) Operation Mode - each plaintext block is encrypted independently without any input from other blocks. 2020-10-18, 4000👍, 4💬
Geometric Introduction to Elliptic Curves
This chapter provides a geometric introduction of elliptic curves and the associated addition operation. Topics includes what is an elliptic curve and its geometric properties; geometric algorithm defining an addition operation; infinity point or identity element; commutativity and associativity of ... 2020-09-12, 249👍, 1💬
Visiting a "https" Web Site with Chrome
This section describes how Google Chrome 24 shows a lock icon when you visit an 'https' Web site to provide you more security related information. 2020-07-02, 418👍, 2💬
EC Cryptography Tutorials - Herong's Tutorial Examples
This EC (Elliptic Curve) cryptography tutorial book is a collection of notes and sample codes written by the author while he was learning cryptography technologies himself. Topics include rule of chord and point addition on elliptic curves; Abelian groups with additive and multiplicative notations; ... 2020-06-23, 2038👍, 4💬
Introduction of DSA (Digital Signature Algorithm)
This chapter provides tutorial notes and example codes on DSA (Digital Signature Algorithm). Topics include introduction of DSA; illustration of DSA key generation, message signing and signature verification; proof of Digital Signature Algorithm. 2020-06-04, 4259👍, 12💬
What Is DER (Distinguished Encoding Rules) Encoding?
This section describes the DER (Distinguished Encoding Rules) - A binary format of encoding a data value of any data types including nested data structures. 2020-06-01, 15247👍, 5💬
DES Decryption Algorithm
This section describes DES decryption algorithm - identical to the encryption algorithm step by step in the same order, only with the subkeys applied in the reverse order. 2020-05-19, 4224👍, 4💬
Cleartext Block Size for RSA Encryption
This section discusses what is the most efficient block size when dividing a Cleartext message into blocks for RSA public encryption. The suggested block size is 'floor((x-1)/8)', where 'x' is the RSA key size, or the key modulus bit length. 2020-03-13, 137👍, 1💬
Certificate in PEM Format
This section describes what is certificate PEM (Privacy Enhanced Mail) format - A format uses PEM idea to convert a certificate in DER format to a message of printable characters. The conversion uses the Base64 encoding. 2020-02-23, 7025👍, 4💬
This section describes how to download and install Microsoft JDBC Driver 4.2 for SQL Server 2014.
This chapter provides notes and tutorial examples on XML Tools Plugin for Notepad++. Topics include ...
This section describes the -Xss option to specify JVM stack size. Changing stack size can help to es...
This section provides a tutorial example on how to perform validation of a certificate path with the...
This section provides a tutorial example on how to download and install JDK 1.6.2 (Java SE 1.6 Updat...