Cryptography Tutorials - Herong's Tutorial Examples


Book Description

This cryptography tutorial book is a collection of notes and sample codes written by the author while he was learning cryptography technologies himself. Topics include MD5 and SHA1 message digest algorithms and implementations, DES, Blowfish and AES secret key cipher algorithms and implementations, RSA and DSA public key encryption algorithms and implementations, Java and PHP cryptography APIs, OpenSSL, keytool and other cryptography tools, PKI certificates and Web browser supports. Updated in 2023 (Version v5.42) with minor changes. For latest updates and free sample chapters, visit https://www.herongyang.com/Cryptography.




EC Cryptography Tutorials - Herong's Tutorial Examples


Book Description

This EC (Elliptic Curve) cryptography tutorial book is a collection of notes and sample codes written by the author while he was learning cryptography technologies himself. Topics include rule of chord and point addition on elliptic curves; Abelian groups with additive/multiplicative notations; EC as Abelian groups; DLP (Discrete Logarithm Problem) and trapdoor function; Galois fields or finite fields with Additive/Multiplicative Abelian Group; Prime fields, binary fields, and polynomial fields; EC fields reduced with modular arithmetic; EC subgroup and base points; EC private key and public key pairs; ECDH (Elliptic Curve Diffie-Hellman) protocol; ECDSA (Elliptic Curve Digital Signature Algorithm); ECES (Elliptic Curve Encryption Scheme) protocol; Java tool/program to generate EC keys. Updated in 2022 (Version v1.02) with minor changes. For latest updates and free sample chapters, visit https://www.herongyang.com/EC-Cryptography.







Blowfish Cipher Tutorials - Herong's Tutorial Examples


Book Description

This tutorial book is a collection of notes and sample codes written by the author while he was learning Blowfish cipher himself. Topics basic concepts of cipher and encryption; introduction of Blowfish cipher algorithm; 8366 Hex Digits of PI; Perl Crypt::Blowfish and Crypt::CBC, Crypt::CFB modules; OpenSSL Blowfish ciphers: bf-ecb, bf-cbc, bf-cfb, bf-ofb; PHP Mcrypt extension; Blowfish CFB-8 and OFB-8 operation modes. Updated in 2024 (Version v2.04) with minor changes. For latest updates and free sample chapters, visit https://www.herongyang.com/Blowfish.




Blowfish Cipher Tutorials - Herong's Tutorial Examples


Book Description

This tutorial book is a collection of notes and sample codes written by the author while he was learning Blowfish cipher himself. Topics basic concepts of cipher and encryption; introduction of Blowfish cipher algorithm; 8366 Hex Digits of PI; Perl Crypt::Blowfish and Crypt::CBC, Crypt::CFB modules; OpenSSL Blowfish ciphers: bf-ecb, bf-cbc, bf-cfb, bf-ofb; PHP Mcrypt extension; Blowfish CFB-8 and OFB-8 operation modes. Updated in 2024 (Version v2.04) with minor changes. For latest updates and free sample chapters, visit https://www.herongyang.com/Blowfish.




PKI Tutorials - Herong's Tutorial Examples


Book Description

This tutorial book is a collection of notes and sample codes written by the author while he was learning PKI (Public Key Infrastructure) technologies himself. Topics include Root CA (Certificate Authorities); SSL, TLS, and HTTPS; Server and client authentication processes; Communication data encryption; Using HTTPS with Chrome, Firefox, Edge, Safari and Internet Explorer; Managing certificates on Windows, macOS, iOS and Android systems; X.509 certificate format; Certificate store and management tools; Certificate validation chain; Self-signed certificate and CSR; Digital signature on MS Word and OpenOffice documents; Get free personal certificate from Comodo. Updated in 2022 (Version v2.31) with macOS and Safari tutorials. For latest updates and free sample chapters, visit https://www.herongyang.com/PKI.




JDK Tutorials - Herong's Tutorial Examples


Book Description

This book is a collection of tutorial notes and sample codes written by the author while he was learning JDK (Java Development Kit) core libraries himself. Topics include Time and Calendar, Internationalization, Unnamed Packages, Collections, Character Set and Encoding, Logging, XML related technologies: DOM, SAX, DTD, XSD, and XSL, Cryptography, Certificates, Key stores, Cipher and Encryption, Socket communication, SSL and HTTPS. Updated in 2024 (Version v6.32) with JDK 20. For latest updates and free sample chapters, visit https://www.herongyang.com/JDK.




Challenges in the IoT and Smart Environments


Book Description

This book is an invaluable reference for those operating within the fields of Cyber Security, Digital Forensics, Digital Policing, Computer Science and Artificial Intelligence. The Internet of Things (IoT) ecosystem presents a wide range of consumer, infrastructure, organisational, industrial and military applications. The IoT technologies such as intelligent health-connected devices; unmanned aerial vehicles (UAVs); smart grids; cyber-physical and cyber-biological systems; and the Internet of Military/Battlefield Things offer a myriad of benefits both individually and collectively. For example, implantable devices could be utilised to save or enhance patients’ lives or offer preventative treatments. However, notwithstanding its many practical and useful applications, the IoT paradigm presents numerous challenges spanning from technical, legal and investigative issues to those associated with security, privacy and ethics. Written by internationally-renowned experts in the field, this book aims to contribute to addressing some of these challenges. Lawyers, psychologists and criminologists could also find this book a very valuable resource at their disposal, and technology enthusiasts might find the book interesting. Furthermore, the book is an excellent advanced text for research and master’s degree students as well as undergraduates at their final years of studies in the stated fields.




SOAP Web Service Tutorials - Herong's Tutorial Examples


Book Description

This book is a collection of notes and sample codes written by the author while he was learning SOAP Web service. Topics include introduction of SOAP specifications; SOAP modules, features, and message structure; SOAP Message Exchange Patterns; Python, Perl, PHP, and Java support of SOAP Web services; WS-Security, Username Token and X.509 Token; Signing and Encrypting SOAP messages; Using SoapUI for Web service testing. Updated in 2024 (Version v5.13) with Python tutorials. For latest updates and free sample chapters, visit https://www.herongyang.com/Web-Services.




Tutorials on the Foundations of Cryptography


Book Description

This is a graduate textbook of advanced tutorials on the theory of cryptography and computational complexity. In particular, the chapters explain aspects of garbled circuits, public-key cryptography, pseudorandom functions, one-way functions, homomorphic encryption, the simulation proof technique, and the complexity of differential privacy. Most chapters progress methodically through motivations, foundations, definitions, major results, issues surrounding feasibility, surveys of recent developments, and suggestions for further study. This book honors Professor Oded Goldreich, a pioneering scientist, educator, and mentor. Oded was instrumental in laying down the foundations of cryptography, and he inspired the contributing authors, Benny Applebaum, Boaz Barak, Andrej Bogdanov, Iftach Haitner, Shai Halevi, Yehuda Lindell, Alon Rosen, and Salil Vadhan, themselves leading researchers on the theory of cryptography and computational complexity. The book is appropriate for graduate tutorials and seminars, and for self-study by experienced researchers, assuming prior knowledge of the theory of cryptography.