<< < 4 5 6 7 8 9 10 11 12 13 14 > >>   ∑:342  Sort:Date

DLP And Trapdoor Function
This section exams the difficulty level of the Discrete Logarithm Problem (DLP) in several Abelian Group examples to see if them can be used to build trapdoor functions.
2022-10-01, ∼305🔥, 0💬

"DumpKey.java" Dumping Private Keys Out of "keystore"
This section provides a tutorial example on how to dump private key and public key pair output of a 'PrivateKeyEntry' in a 'keystore' file using a Java program, DumpKey.java.
2022-10-05, ∼304🔥, 0💬

What Is Discrete Logarithm Problem (DLP)
This section describes what is Discrete Logarithm Problem (DLP), which is the reverse operation of an exponentiation (or scalar multiplication) operation in an Abelian group.
2022-10-01, ∼303🔥, 0💬

References
List of reference materials used in this book.
2022-10-01, ∼302🔥, 0💬

What Are Standard Elliptic Curves
This section provides a list of standard elliptic curves selected and recommended by different organizations to generate secure EC private-pubic key pairs.
2022-10-01, ∼302🔥, 0💬

Java Default Implementation of DSA
This chapter provides tutorial notes and example codes on the Java default implementation of DSA (Digital Signature Algorithm). Generating DSA key pair in Java; Examples of public key and private key pairs; Checking DSA key parameter; Generating DSA digital signature in Java using SHA1withDSA; Verif...
2022-10-13, ∼299🔥, 0💬

Algebraic Solution for Point Doubling
This section provides an algebraic solution for calculating the addition operation of two points at the same location on an elliptic curve.
2022-10-01, ∼296🔥, 0💬

PKCS#8 and X.509 Key Encoding Classes
This section describes 2 JDK classes: PKCS8EncodedKeySpec representing the PKCS#8 encoding standard and the X.509 encoding standard.
2022-10-05, ∼295🔥, 0💬

Scalar Multiplication or Exponentiation
This section describes what is Scalar Multiplication or Exponentiation in Abelian Groups. They are used represent the process of performing Abelian Group operations consecutively n times with the same element.
2022-10-01, ∼295🔥, 0💬

Additive Notation of Abelian Group
This section describes the Additive notation of an Abelian Group. The addition sign, +, is used as the operator. Number 0 is used as the identity element.
2022-10-01, ∼294🔥, 0💬

Terminology
List of terms used in this book.
2022-10-01, ∼292🔥, 0💬

OpenSSL Generating and Managing RSA Keys
This chapter provides tutorial notes and example codes on managing RSA keys with OpenSSL. Topics include generating new RSA keys; viewing existing RSA keys; encrypting RSA keys with DES algorithm to protect them with passwords.
2025-02-21, ∼286🔥, 1💬

💬 2025-02-21 bz: good for helping me

Set Subgroup Order to Higher Value
This section provides a tutorial example on how to set the subgroup order a value greater than the order of the entire group, like 2 times of the modulo, to ensure correct result of scalar multiplications.
2022-10-01, ∼286🔥, 0💬

RsaKeyEncryption.java for RSA Encryption Operation
This section provides a tutorial example on how to implement RSA encryption operation using the java.math.BigInteger class. The important part of the implementation is to determine the cleartext block size, ciphertext block size, and the padding of the last block.
2022-12-15, ∼284🔥, 1💬

What Is Abelian Group
This section describes Abelian Group, which a set of elements with a binary operation satisfing 5 conditions.
2022-10-01, ∼284🔥, 0💬

OFB (Output FeedBack) as a Stream Cipher
This section describes how DES OFB (Output FeedBack) operation mode can be modified as a 1-bit stream cipher or a 1-byte stream cipher.
2022-10-04, ∼282🔥, 0💬

Modular Multiplication of 11 - Abelian Group
This section provides an Abelian Group using the modular arithmetic multiplication of 11 (integer multiplication operation followed by a modular reduction of 11).
2022-10-01, ∼281🔥, 0💬

What Is Subgroup in Abelian Group
This section describes Subgroups in a Abelian Group. A subgroup in a Abelian Group is a subset of the Abelian Group that itself is an Abelian Group. The subgroup and its parent group are using the same operation.
2022-10-01, ∼281🔥, 0💬

Archived Tutorials
This chapter contains some outdated tutorial notes and example codes from previous versions of this book.
2022-10-06, ∼278🔥, 0💬

mcrypt Encryption Functions
This section describes mcrypt encryption functions and 4 DES ciphers (operation modes) - 8-byte ECB, 8-byte CBC, 1-byte CFB, and 1-byte OFB ciphers.
2023-02-28, ∼274🔥, 1💬

💬 2023-02-28 adry: password

Converting Elliptic Curve Groups
This section describes steps on how to convert real number elliptic curve groups to cyclic subgroups of integer elliptic curve groups.
2022-10-01, ∼273🔥, 0💬

Secret Key Generation and Management
This chapter provides tutorial notes and example codes on secret keys. Topics include secret keys for Blowfish, DES, or HmacMD5 encryption algorithms; key generator class; test program to generate secret keys and save them in files.
2025-01-29, ∼270🔥, 1💬

What Is Key Encoding?
This section describes private and public key encoding standards: PKCS#8 is used for encoding private keys and X.509 is used for encoding public keys.
2022-10-06, ∼266🔥, 0💬

"openssl dsa" Viewing Private and Public Key Pair
This section provides a tutorial example on how to view a private and public key pair stored in PEM format using the 'openssl dsa' command. The key pair was originally generated by the 'keytool -genkeypair' command.
2022-10-04, ∼266🔥, 0💬

<< < 4 5 6 7 8 9 10 11 12 13 14 > >>   ∑:342  Sort:Date