<< < 1 2 3 4 5 6 7 8 > >>   ∑:342  Sort:Date

"secp256r1" - For 256-Bit ECC Keys
This section describes 'secp256r1' elliptic curve domain parameters for generating 256-Bit ECC Keys as specified by secg.org.
2023-10-20, 3370🔥, 1💬

💬 2023-10-20 Duy: hello

Cryptography Terminology
This section provides descriptions on some commonly used cryptography terminologies
2019-02-18, 3305🔥, 2💬

💬 2019-02-18 Hh: &lt;body bgcolor="red">

💬 2015-10-24 dexter aparicio: this site is my favorite reference on cryptography topics

Cryptography Basic Concepts
This chapter describes some basic concepts of cryptography: what is cryptography, what is function and what is encryption.
2016-04-07, 3295🔥, 4💬

💬 2016-02-03 dinesh: thanks

💬 2015-12-28 Herong: Malini, RSA is good example of cryptosystem. Read Introduction of RSA Algorithm for more information.

💬 2015-12-28 malini: need cryptosystem

What is OFB (Output FeedBack) Operation Mode?
This section describes what is OFB (Output FeedBack) Operation Mode - each plaintext block is XORed with the current output block to be the ciphertext block. The current output block is the encrypted version of the previous output block.
2015-11-13, 3244🔥, 2💬

💬 2015-11-13 Ashish: Hello world!

What Is Cryptography?
This section describes what is cryptography - The study of techniques related to all aspects of data security.
2021-04-25, 3237🔥, 6💬

💬 2021-04-25 jlong: thanks

💬 2017-02-18 gabu: ggoodd

💬 2016-11-17 mohamed: yes

💬 2015-10-20 Herong: Hi Ian, the Rail Fence cipher is very simple example of encryption we can do manually. See the Transposition cipher page at wiki...

💬 2015-10-19 Ian T. Lee: Can you give me a simple example of how to do cryptography manually?

(More comments ...)

What Is ECDH Key Exchange
This section introduces what is ECDH Key Exchange - a protocol that uses the Elliptic Curve group property to establish a shared secret key without sending it directly to each other.
2023-11-09, 3082🔥, 3💬

💬 2021-11-08 Carol: Thanks

How Secure Is RSA Algorithm?
This section discusses the security of RSA public key encryption algorithm. RSA private key is not 100% secure. But if the private key uses larger value of n = p*q, it will take a very long time to crack the private key.
2022-04-12, 2884🔥, 5💬

💬 2022-04-12 Yesssuuh: Gang way

💬 2017-11-10 Anonymous: LOLZZZ

What is CFB (Cipher FeedBack) Operation Mode?
This section describes what is CFB (Cipher FeedBack) Operation Mode - each plaintext block is XORed with the encrypted version of the ciphertext of the previous block to be the ciphertext block.
2017-01-13, 2755🔥, 3💬

💬 2016-12-07 fakhrulislam: i want a copy of this book !

💬 2015-11-06 poonam: a perfect explanation

DES Key Schedule Algorithm Illustration Program Output
This section provides the execution output of the tutorial Java program, DESSubkeysTest.java, to illustrate how DES key schedule algorithm works.
2015-08-09, 2496🔥, 1💬

💬 2015-08-08 nishant nath: I loved it

"brainpoolP256r1"“ - For 256-Bit ECC Keys
This section describes 'brainpoolP256r1' elliptic curve domain parameters for generating 256-Bit ECC Keys as specified by RFC 5639.
2022-10-01, 2385🔥, 0💬

SHA1 Mesasge Digest Algorithm
This chapter provides tutorial notes and example codes on the SHA1 message digest algorithm. Topics include SHA1 algorithm overview; using SHA1 in Java, PHP, and Perl.
2016-11-05, 2297🔥, 5💬

💬 2015-10-14 Herong: Yojana, information on key generation of Blowfish Algorithm can be found in Key Schedule (Sub-Keys Generation) Algorithm tutoria...

💬 2015-10-13 Yojana Yadav: Plz send me the detail of key generation of Blowfish Algorithm

💬 2013-06-28 Herong: Abbas, You are welcome!

💬 2013-06-26 abbas: thank you for sha-1 and it's so helpful

"openssl pkcs12" Merging Key with Certificate
This section provides a tutorial example on how to merge a private key and its self-signed certificate into a single PKCS#12 file, with can be then encoded as PEM and encrypted with DES.
2018-07-07, 2194🔥, 1💬

EC Private Key Example - secp256k1
This section describes the elliptic curve, E(0,7), also named as secp256k1, and the subgroup parameters, which are used in Bitcoin, Ethereum, and many other cryptocurrency apps.
2023-01-24, 2152🔥, 3💬

💬 2023-01-24 3azzi: 9awed

Key Pair Sample Program - JcaKeyPair.java
This section provides a tutorial example on how to write simple program to generate a pair of private key and public key for the RSA or DSA algorithm.
2016-03-01, 2061🔥, 1💬

💬 2016-03-01 Shruti: thanks

Introduction to DES Algorithm
This chapter provides tutorial examples and notes about DES (Data Encryption Standard) algorithm. Topics include description of block cipher, DES encryption algorithm, Round Keys Generation, DES decryption algorithm.
2018-10-18, 1825🔥, 4💬

💬 2018-10-18 sam: harry please stop bullying me

mcrypt DES Encryption Testing Program
This section provides a tutorial example on how to use the DES algorithm in a specific operation mode as block or stream cipher.
2017-08-03, 1797🔥, 3💬

💬 2017-08-03 Herong: Deepan, Which part is difficult for you to understand?

💬 2017-07-27 Deepan: I can't understand

Key Schedule (Sub-Keys Generation) Algorithm
This section describes the Blowfish Key Schedule (Sub-Keys Generation) algorithm. It uses the binary representation of the fractional portion of constant Pi - 3.1415927... as initial values.
2023-06-05, 1740🔥, 3💬

💬 2023-06-05 Daniel: I don't understand how to assign key for plaintext

💬 2016-03-17 Herong: Hi Yogita, Blowfish(T) function refers the Blowfish algorithm described in the previous tutorial: Blowfish Cipher Algorithm .

💬 2016-03-16 YOGITA: what is the function blowfish(T) here? Send the pseudo code

"keytool -keyalg EC" - Generate EC Key Pair
This section provides a tutorial example on how to use 'keytool' provided in JDK (Java Development Kit) package to generate EC private-public key pairs using the the 'keytool -genkeypair -keyalg EC' command.
2022-10-01, 1600🔥, 0💬

DESSubkeysTest.java - DES Key Schedule Algorithm Illustration
This section provides a tutorial Java program, DESSubkeysTest.java, to illustrate how DES key schedule algorithm works.
2020-02-10, 1559🔥, 3💬

💬 2020-02-10 Art: No comments

💬 2018-07-20 aqil: havr fun

Generating New RSA Key Pairs
This section provides a tutorial example on how to generate a new pair of RSA priviate key and public key using the OpenSSL command line tool.
2015-11-03, 1542🔥, 1💬

💬 2015-11-03 Juli: Thanks

64-bit RSA Key Validated by RsaKeyValidator.java
This section provides a tutorial example on how a 64-bit RSA key is validated by RsaKeyValidator.java with 3 rounds of encryption and decryption tests.
2023-03-05, 1508🔥, 3💬

💬 2018-06-09 Herong: Adrian, you are welcome!

💬 2018-06-09 Adrian: I needed in rush working 64-bit keys. You helped me a lot. Thanks! :D

DSA 512-bit and 1024-bit Key Pair Examples
This section provides 2 DSA key pair examples, 512-bit and 1024-bit, using DsaKeyGenerator.java.
2017-11-08, 1438🔥, 1💬

💬 2017-11-08 abc: ok

OpenSSL Introduction and Installation
This chapter provides tutorial notes and example codes on OpenSSL. Topics include introduction of OpenSSL; installing OpenSSL on Windows systems.
2017-12-24, 1415🔥, 4💬

💬 2016-11-28 musa: thanks

PKCS#8/X.509 Private/Public Encoding Standards
This chapter provides tutorial notes and example codes on PKCS#8 and X.509 key encoding standards. Topics include PKCS#8 standard for private key encoding; X.509 standard for public key encoding; PKCS8EncodedKeySpec and X509EncodedKeySpec classes to decode encoded keys; JcaKeyFactoryTest.java test p...
2021-11-22, 1398🔥, 1💬

<< < 1 2 3 4 5 6 7 8 > >>   ∑:342  Sort:Date