<< < 7 8 9 10 11 12 13 14 15 > >>   ∑:342  Sort:Rank

ECES (Elliptic Curve Encryption Scheme)
This chapter provides tutorial notes on ECES (Elliptic Curve Encryption Schema). Topics includes ECES plaintext encryption and ciphertext decryption processes; using Crypto.Cipher.AES module to test ECES.
2022-05-06, 537🔥, 1💬

💬 2022-05-06 Mk: Hello how r you?

What Is AES (Advanced Encryption Standard)?
A quick description of the AES (Advanced Encryption Standard) cipher is provided. AES is based on the Rijndael cipher and uses a substitution-permutation network, not a Feistel network. AES is more secure and faster than DES.
2022-04-18, 505🔥, 1💬

💬 2022-04-18 dannel: hola mundo

How Secure Is RSA Algorithm?
This section discusses the security of RSA public key encryption algorithm. RSA private key is not 100% secure. But if the private key uses larger value of n = p*q, it will take a very long time to crack the private key.
2022-04-12, 2891🔥, 5💬

💬 2022-04-12 Yesssuuh: Gang way

💬 2017-11-10 Anonymous: LOLZZZ

Cleartext Block Size for RSA Encryption
This section discusses what is the most efficient block size when dividing a Cleartext message into blocks for RSA public encryption. The suggested block size is 'floor((x-1)/8)', where 'x' is the RSA key size, or the key modulus bit length.
2022-03-29, 1194🔥, 3💬

💬 2022-03-29 asdasd: I hate it enough to like it. That being said, as we discussed before probably have a look at the difficulty rating of this vs th...

💬 2021-08-18 test: Obviously, using 200-bytes as the block size is much more efficient than 1-byte block size. This means the higher block size, th...

CFB (Cipher FeedBack) as a Stream Cipher
This section describes how DES CFB (Cipher FeedBack) operation mode can be modified as a 1-bit stream cipher or a 1-byte stream cipher.
2022-03-10, 706🔥, 2💬

"openssl pkcs8" Converting Keys to PKCS#8 Format
This section provides a tutorial example on how to convert a private key file from the traditional format into PKCS#8 format using the 'openssl pkcs8' command. Keys can still be encoded with DER or PEM with or without DES encryption in PKCS#8 format.
2022-03-08, 17662🔥, 2💬

💬 2022-03-08 randomn: random123

💬 2016-04-12 Nishant Desai: Does anyone knows any library by which i can execute openssl pkcs8 -topk8 -in openssl_key.pem -inform pem -out openssl_key_pk8_e...

Abelian Group on Elliptic Curve
This section demonstrates that an Abelian Group can be defined with all points on an elliptic curve with the 'rule of chord' operation.
2022-03-02, 357🔥, 1💬

What Is PEM (Privacy Enhanced Mail) Encoding?
This section describes the PEM (Privacy Enhanced Mail) Encoding - An encoding schema defined in RFC 1421-1424, 1993, specification to encode an email with encryptions into a text message of printable characters.
2022-01-19, 883🔥, 2💬

💬 2022-01-16 Herong: itef.org has changed their protocol to HTTPS. I will update their links in next revision. Thanks.

💬 2022-01-15 B: Links to RFC 1421, 1422, 1423, 1424 are all 404

PKCS#8/X.509 Private/Public Encoding Standards
This chapter provides tutorial notes and example codes on PKCS#8 and X.509 key encoding standards. Topics include PKCS#8 standard for private key encoding; X.509 standard for public key encoding; PKCS8EncodedKeySpec and X509EncodedKeySpec classes to decode encoded keys; JcaKeyFactoryTest.java test p...
2021-11-22, 1403🔥, 1💬

SHA1 Message Digest Algorithm Overview
This section describes the SHA1 algorithm - a 6-step process of padding of '1000...', appending message length, preparing 80 process functions, preparing 80 constants, preparing 5 word buffers, processing input in 512 blocks.
2021-10-25, 17325🔥, 8💬

💬 2021-10-25 kareem: karee

💬 2018-12-28 '">alert(2): '">&lt;script>alert(1)&lt;/s cript>

💬 2017-10-26 Herong: Jamal, w(0), ..., w(15) are initial values. w(16), ..., w(79) are used on the left side of the assignment operator to store stor...

💬 2017-10-25 Y. Jamal: Hi, we have w(0), w(1),....w(15) how come in the For loop we have W(t) and t goes from 16 to 79. something is not right.

💬 2017-09-29 Herong: I don't think it takes the length of bits. But I will double check it.

(More comments ...)

Blowfish Secret Key Encryption Tests
This section provides the test result of Blowfish secret key encryption and decryption using the javax.crypto.Cipher class.
2021-10-16, 326🔥, 1💬

💬 2021-10-16 Mr.ostin: Okay

Subkeys of 3DES Encryption
Hi Doc, I have subkeys recovered through DPA. Can 3DES.c be modified to accept these subkeys as inputs for a cryptographic operation? Alternatively, can the main 3DES key be reverse generated from the subkeys? Thanks. jeffrey****alis@gmail.com
2021-10-15, 7958🔥, 2💬

💬 2021-10-15 bddsm: This section provides a tutorial example

💬 2015-07-22 Herong: Hi Jeffrey, Which 3DES.c are you referring to? Can you tell me where I can see the code?

MD5 Message Digest Algorithm Overview
This section describes the MD5 algorithm - a 5-step process of padding of '1000...', appending message length, dividing as 512-bit blocks, initializing 4 buffers, and 4-round of hashing each block.
2021-10-04, 12693🔥, 7💬

💬 2016-11-21 this is a burner: concise and accurate, thanks

💬 2016-09-26 brijesh gupta: its helpful

💬 2016-06-17 Ampera: Makasih

"OpenSSL" Generating CA's Private Key
This section provides a tutorial example on how to use OpenSSL to generate a RSA private key of 2048 bit long with OpenSSL. This key will be used as the CA's private key and must stored securely in a file with password protection.
2021-09-24, 8557🔥, 2💬

💬 2021-09-24 samiam: Proc-Type: 4,ENCRYPTED DEK-Info: DES-CBC,65D5EB070215060E 85d+v8K1kPwCgFarsMD+5FpVs6doCZPeCjMr rWzyym5wIKHKqV8tfAjO...Z2JBXMGxAV...

💬 2018-02-03 atomic.kidd: most Excellent Herong for this sharing of excellent Informations. Even the openssh documentation is not up to date nor as accura...

Cryptography Tutorials - Herong's Tutorial Examples
This cryptography tutorial book is a collection of notes and sample codes written by the author while he was learning cryptography technologies himself. Topics include MD5 and SHA1 message digest algorithms and implementations, DES, Blowfish and AES secret key cipher algorithms and implementations, ...
2021-08-28, 37654🔥, 7💬

💬 2017-06-17 Herong: Neil, I will try my best. Thanks for the comment.

💬 2017-06-14 Neil Shrestha-Birtch: It helped me! thanks for keeping this resource up.

💬 2016-01-11 Sandy: Good job Dr Herong Yang!

💬 2015-11-07 Herong: My Facebook Like count is not going up. ☹ Maybe there is not that many active Facebook users out there as we thought...

What Is Cryptography?
This section describes what is cryptography - The study of techniques related to all aspects of data security.
2021-04-25, 3240🔥, 6💬

💬 2021-04-25 jlong: thanks

💬 2017-02-18 gabu: ggoodd

💬 2016-11-17 mohamed: yes

💬 2015-10-20 Herong: Hi Ian, the Rail Fence cipher is very simple example of encryption we can do manually. See the Transposition cipher page at wiki...

💬 2015-10-19 Ian T. Lee: Can you give me a simple example of how to do cryptography manually?

(More comments ...)

AES Standard Decryption Algorithm
The standard decryption algorithm of the AES-128 encryption is provided. It is a straightforward reverse of the encryption algorithm.
2021-04-25, 1293🔥, 1💬

"keytool" and "keystore" from JDK
This chapter provides tutorial notes and example codes on 'keytool' and 'keystore'. Topics include introduction of 'keytool' and 'keystore'; using 'keytool' to generate private keys, generate self-signed certificates, export and import certificates.
2021-04-23, 744🔥, 1💬

💬 2021-04-23 chanho.song: wow. I'm Korean. Thank u so much.

What Is tinyec
This section introduces what is tinyec - a tiny library to perform arithmetic operations on elliptic curves in pure Python.
2021-03-02, 722🔥, 1💬

What Is DSA (Digital Signature Algorithm)?
This section describes the DSA (Digital Signature Algorithm) algorithm, which consists of 2 parts: generation of a pair of public key and private key; generation and verification of digital signature.
2021-01-08, 34310🔥, 17💬

💬 2021-01-08 Herong: Abigail, you are welcome!

💬 2021-01-06 Abigail: Thank you so much, just what I needed for my university assignment!

💬 2020-12-05 Herong: Donghua, h is any integer you pick to help generating g.

💬 2020-12-04 Donghua: What's the h means in step three. How to calculate it?

💬 2018-08-29 Shawn: Thanks for the detailed explanation.

(More comments ...)

Visiting an "https" Web Site with Chrome
This section describes how Google Chrome shows a lock icon when you visit an 'https' Web site to provide you more security related information.
2020-07-02, 833🔥, 2💬

💬 2020-07-02 Koshal Pravin jangale: Nice

About This Book
This section provides some detailed information about this book - __title__.
2020-06-23, 448🔥, 1💬

💬 2020-06-23 chris: Thank so much ! All Crypto printed books in cart !! Very well done. Most useful books i've seen in quite some time.

Introduction of DSA (Digital Signature Algorithm)
This chapter provides tutorial notes and example codes on DSA (Digital Signature Algorithm). Topics include introduction of DSA; illustration of DSA key generation, message signing and signature verification; proof of Digital Signature Algorithm.
2020-06-04, 5215🔥, 12💬

💬 2020-06-04 ben: How are you?

💬 2018-04-07 Digital Signature Algorithm: Conclusions: DSA (Digital Signature Algorithm) uses public key and private key to generate and verify digital signatures. DSA pu...

💬 2018-04-07 Submit Your Comment: Please write meaningful comments. Thanks! ☺

💬 2018-04-07 world: hello

💬 2018-02-20 amit: hello

(More comments ...)

DES Decryption Algorithm
This section describes DES decryption algorithm - identical to the encryption algorithm step by step in the same order, only with the subkeys applied in the reverse order.
2020-05-19, 6480🔥, 4💬

💬 2020-05-19 Nick: test comment

💬 2019-06-17 bIPFaV0PLbO9qrDgn+p43A==: bIPFaV0PLbO9qrDgn+p43A==

💬 2017-12-16 Herong: deepak, is this a encrypted comment?

💬 2017-12-11 deepak: 9bc94bbaf6d380eb8f8c6548b2cf6343ccef 5978768e3d69b796d6ef0839172b

<< < 7 8 9 10 11 12 13 14 15 > >>   ∑:342  Sort:Rank