< 1 2 3 4 > >>   Sort: Rank

About This Book
This section provides some detailed information about this book - __title__.
2020-06-23, 219👍, 1💬

💬 2020-06-23 chris: Thank so much ! All Crypto printed books in cart !! Very well done. Most useful books i've seen in quite some time.

EC Cryptography Tutorials - Herong's Tutorial Examples
This EC (Elliptic Curve) cryptography tutorial book is a collection of notes and sample codes written by the author while he was learning cryptography technologies himself. Topics include rule of chord and point addition on elliptic curves; Abelian groups with additive/multiplicative notations; EC a...
2020-06-23, 2463👍, 4💬

💬 2020-06-23 Herong: Chris, contact me by email. I will send you a PDF copy. Thanks for your comment.

💬 2020-06-22 chris: Sorry for fuss. Bought this ebook on google. bad idea. Should have not done that and just got the physical book or maybe ebook o...

💬 2019-07-02 Eleftheria Drosopoulou: Hello Herong, Nice blog! I am editor at Java Code Geeks (www.javacodegeeks.com). We have the JCG program (see www.javacodegeeks....

💬 2019-01-01 Yale: Thank you!

Introduction of DSA (Digital Signature Algorithm)
This chapter provides tutorial notes and example codes on DSA (Digital Signature Algorithm). Topics include introduction of DSA; illustration of DSA key generation, message signing and signature verification; proof of Digital Signature Algorithm.
2020-06-04, 4443👍, 12💬

💬 2020-06-04 ben: How are you?

💬 2018-04-07 Digital Signature Algorithm: Conclusions: DSA (Digital Signature Algorithm) uses public key and private key to generate and verify digital signatures. DSA pu...

💬 2018-04-07 Submit Your Comment: Please write meaningful comments. Thanks! ☺

💬 2018-04-07 world: hello

💬 2018-02-20 amit: hello

(More comments ...)

What Is DER (Distinguished Encoding Rules) Encoding?
This section describes the DER (Distinguished Encoding Rules) - A binary format of encoding a data value of any data types including nested data structures.
2020-06-01, 18370👍, 5💬

💬 2018-10-29 Thanks!: meaningful comments.

💬 2017-03-15 noname: thanks

💬 2016-01-25 Dev: hello

DES Decryption Algorithm
This section describes DES decryption algorithm - identical to the encryption algorithm step by step in the same order, only with the subkeys applied in the reverse order.
2020-05-19, 4813👍, 4💬

💬 2020-05-19 Nick: test comment

💬 2019-06-17 bIPFaV0PLbO9qrDgn+p43A==: bIPFaV0PLbO9qrDgn+p43A==

💬 2017-12-16 Herong: deepak, is this a encrypted comment?

💬 2017-12-11 deepak: 9bc94bbaf6d380eb8f8c6548b2cf6343ccef 5978768e3d69b796d6ef0839172b

What Is a Digital Signature?
This section describes what is a digital signature and what is the process of generating and verifying digital signature from a message.
2020-02-23, 3578👍, 4💬

💬 2020-02-23 Herong: Sanjay, you are welcome!

💬 2020-02-17 Sanjay: Thank u so much

💬 2019-01-29 nilo: Hola

💬 2016-04-26 santosh patil: Its easy to understand

DESSubkeysTest.java - DES Key Schedule Algorithm Illustration
This section provides a tutorial Java program, DESSubkeysTest.java, to illustrate how DES key schedule algorithm works.
2020-02-10, 1220👍, 3💬

💬 2020-02-10 Art: No comments

💬 2018-07-20 aqil: havr fun

mcrypt Library for PHP
This section describes the mcrypt library - encryption extension for PHP. mcrypt supports DES and many other encryption algorithms.
2019-12-19, 114👍, 1💬

Blowfish - 8-Byte Block Cipher
This chapter provides tutorial examples and notes about Blowfish block cipher. Topics include Blowfish encryption and decryption algorithm; Blowfish sub-key generation schema, Blowfish algorithm implementation in Java.
2019-12-16, 449👍, 1💬

💬 2019-12-16 gio: i love you

"OpenSSL" Viewing Certificates in DER and PEM
This section provides a tutorial example on how to use 'OpenSSL' to view certificates in DER and PEM formats generated by the 'keytool -exportcert' command.
2019-10-05, 51315👍, 7💬

💬 2019-10-05 Herong: Fatin, what are you getting from the output?

💬 2019-09-27 Fatin: Please help me, i cannot get it that way

💬 2017-05-27 Herong: Yes, asn1parse is a nice tool. I will add some examples later.

💬 2017-05-23 poshak: MIIC8DCCAIGgAwIBAgIJAM/+E5HIKoWGMAoG ...

💬 2017-05-23 Herong: Poshak, do you need any help with your certificate?

(More comments ...)

Testing RsaKeyEncryption.java with a 16-bit Key
This section provides a tutorial example on testing my RSA encryption and decryption implementation using the java.math.BigInteger class with a 16-bit key.
2019-09-02, 107👍, 1💬

References Used in Cryptography Tutorials
List of reference materials used in this book.
2019-06-30, 298👍, 1💬

💬 2019-06-30 Wayne: This is very helpful, Thank you!

tinyec - Python Library for ECC
This chapter provides tutorial notes on 'tinyec' Python library for ECC. Topics include installing 'tinyec'; creating ec.Curve objects, performing point addition and scalar multiplication.
2019-05-10, 106👍, 1💬

"keytool" Generating Maria's Private Key
This section provides a tutorial example on how to use 'keytool' to generate a pair of private key and public key.
2019-05-08, 117👍, 1💬

First 8336 Hex Digits of PI
This section provides first 8336 hex digits of constant PI, 3.1415927..., needed for Blowfish encryption algorithm.
2019-04-29, 6212👍, 10💬

💬 2019-04-28 Herong: 8336 Hex Digits. Thanks.

💬 2019-04-26 Harry: Do you mean 8336 digits

💬 2016-10-31 Andres: cool

💬 2016-04-07 Tamas Losonczi: This is great

💬 2016-03-15 Bogdan: Thanks!

(More comments ...)

RSA Private Key and Public Key Pair Sample
This section provides a tutorial example on how to run JcaKeyPair.java to generate a RSA private key and public key pair sample. Keys are stored PKCS#8 and X.509 encoding formats.
2019-04-03, 3176👍, 2💬

💬 2019-03-31 Herong: Thong, if you lost access to your BTC wallet, or lost your BTC wallet, then you lost your BTC asset. There is no way to get it b...

💬 2019-03-29 Thong Ngo: Hi . I forgot the id wallet btc, is there any way to find the id wallet btc no? Thanks .

What Is Block Cipher?
This section describes what is block cipher - An encryption scheme in which 'the clear text is broken up into blocks of fixed length, and encrypted one block at a time'.
2019-04-03, 351👍, 2💬

💬 2019-03-31 Herong: Patrick, f() represents a generic block cipher process that convert a block of plaintext into a block of ciphertext with a secre...

💬 2019-03-26 Patrick: if f is a block cipher, then how can f(R0,k1) be performed? f is likely to be something like a function?

RsaKeyValidator.java for RSA Key Validation
This section provides a tutorial example on how to validate RSA keys by encrypting and decrypting some random sample messages.
2019-04-02, 102👍, 1💬

java.security.KeyFactory - Reading Encoded Keys
This section describes the java.security.KeyFactory class, which allows you to convert key spec objects back to key objects. Full process of reading and converting encoded key files back to key objects are also provided.
2019-03-23, 428👍, 2💬

💬 2019-03-23 Herong: See the next tutorial "JcaKeyFactoryTest.java - Key Factory Test Program" for code samples.

💬 2019-03-13 wubba lubba dub dub: code samples along with this would've been helpful

Example Vector of AES Encryption
An example vector of AES-128 encryption is presented. Round keys and state values of all 11 rounds are included to help users to verify their AES implementation.
2019-02-24, 158👍, 1💬

"keytool" Exporting Certificates in DER and PEM
This section provides a tutorial example on how to export certificates in DER and PEM format using the 'keytool -exportcert' command.
2019-02-20, 41218👍, 5💬

💬 2019-02-20 Ajay Singh: Ok

💬 2018-10-06 Herong: Srinivas, what are those special characters? Are they appended to the keystore file or the certificate file?

💬 2018-09-25 Srinivas: After generating certificate, there are some special characters appended.

💬 2016-06-27 Herong: Mandar, can you double check your command? The error indicates you entered a wrong password.

💬 2016-06-23 Mandar: converting to der is sucessful. while converting to pem, I am getting below error. keytool error: java.io.IOException: Keystore ...

Cryptography Terminology
This section provides descriptions on some commonly used cryptography terminologies
2019-02-18, 2843👍, 2💬

💬 2019-02-18 Hh: &lt;body bgcolor="red">

💬 2015-10-24 dexter aparicio: this site is my favorite reference on cryptography topics

AES Key Schedule Example
An example of the AES key schedule is provided to illustrate how 11 round keys get calculate from a given 128-bit cipher key.
2019-02-18, 2292👍, 1💬

💬 2019-02-18 Ggf: hello

PHP Implementation of DES - mcrypt
This chapter provides tutorial examples and notes about PHP implementation of DES. Topics include introduction of mcrypt library; mcrypt encryption functions; DES encryption and decryption test program and test result.
2018-12-22, 2503👍, 4💬

💬 2018-12-22 Hari: Hello

💬 2016-01-02 sivaprakash: nice

< 1 2 3 4 > >>   Sort: Rank