EC Cryptography Tutorials - Herong's Tutorial Examples


Book Description

This EC (Elliptic Curve) cryptography tutorial book is a collection of notes and sample codes written by the author while he was learning cryptography technologies himself. Topics include rule of chord and point addition on elliptic curves; Abelian groups with additive/multiplicative notations; EC as Abelian groups; DLP (Discrete Logarithm Problem) and trapdoor function; Galois fields or finite fields with Additive/Multiplicative Abelian Group; Prime fields, binary fields, and polynomial fields; EC fields reduced with modular arithmetic; EC subgroup and base points; EC private key and public key pairs; ECDH (Elliptic Curve Diffie-Hellman) protocol; ECDSA (Elliptic Curve Digital Signature Algorithm); ECES (Elliptic Curve Encryption Scheme) protocol; Java tool/program to generate EC keys. Updated in 2024 (Version v1.03) with minor changes. For latest updates and free sample chapters, visit https://www.herongyang.com/EC-Cryptography.




Cryptography Tutorials - Herong's Tutorial Examples


Book Description

This cryptography tutorial book is a collection of notes and sample codes written by the author while he was learning cryptography technologies himself. Topics include MD5 and SHA1 message digest algorithms and implementations, DES, Blowfish and AES secret key cipher algorithms and implementations, RSA and DSA public key encryption algorithms and implementations, Java and PHP cryptography APIs, OpenSSL, keytool and other cryptography tools, PKI certificates and Web browser supports. Updated in 2023 (Version v5.42) with minor changes. For latest updates and free sample chapters, visit https://www.herongyang.com/Cryptography.




EC Cryptography Tutorials - Herong's Tutorial Examples


Book Description

This EC (Elliptic Curve) cryptography tutorial book is a collection of notes and sample codes written by the author while he was learning cryptography technologies himself. Topics include rule of chord and point addition on elliptic curves; Abelian groups with additive/multiplicative notations; EC as Abelian groups; DLP (Discrete Logarithm Problem) and trapdoor function; Galois fields or finite fields with Additive/Multiplicative Abelian Group; Prime fields, binary fields, and polynomial fields; EC fields reduced with modular arithmetic; EC subgroup and base points; EC private key and public key pairs; ECDH (Elliptic Curve Diffie-Hellman) protocol; ECDSA (Elliptic Curve Digital Signature Algorithm); ECES (Elliptic Curve Encryption Scheme) protocol; Java tool/program to generate EC keys. Updated in 2022 (Version v1.02) with minor changes. For latest updates and free sample chapters, visit https://www.herongyang.com/EC-Cryptography.







Challenges in the IoT and Smart Environments


Book Description

This book is an invaluable reference for those operating within the fields of Cyber Security, Digital Forensics, Digital Policing, Computer Science and Artificial Intelligence. The Internet of Things (IoT) ecosystem presents a wide range of consumer, infrastructure, organisational, industrial and military applications. The IoT technologies such as intelligent health-connected devices; unmanned aerial vehicles (UAVs); smart grids; cyber-physical and cyber-biological systems; and the Internet of Military/Battlefield Things offer a myriad of benefits both individually and collectively. For example, implantable devices could be utilised to save or enhance patients’ lives or offer preventative treatments. However, notwithstanding its many practical and useful applications, the IoT paradigm presents numerous challenges spanning from technical, legal and investigative issues to those associated with security, privacy and ethics. Written by internationally-renowned experts in the field, this book aims to contribute to addressing some of these challenges. Lawyers, psychologists and criminologists could also find this book a very valuable resource at their disposal, and technology enthusiasts might find the book interesting. Furthermore, the book is an excellent advanced text for research and master’s degree students as well as undergraduates at their final years of studies in the stated fields.




Guide to Elliptic Curve Cryptography


Book Description

After two decades of research and development, elliptic curve cryptography now has widespread exposure and acceptance. Industry, banking, and government standards are in place to facilitate extensive deployment of this efficient public-key mechanism. Anchored by a comprehensive treatment of the practical aspects of elliptic curve cryptography (ECC), this guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment. In addition, the book addresses some issues that arise in software and hardware implementation, as well as side-channel attacks and countermeasures. Readers receive the theoretical fundamentals as an underpinning for a wealth of practical and accessible knowledge about efficient application. Features & Benefits: * Breadth of coverage and unified, integrated approach to elliptic curve cryptosystems * Describes important industry and government protocols, such as the FIPS 186-2 standard from the U.S. National Institute for Standards and Technology * Provides full exposition on techniques for efficiently implementing finite-field and elliptic curve arithmetic * Distills complex mathematics and algorithms for easy understanding * Includes useful literature references, a list of algorithms, and appendices on sample parameters, ECC standards, and software tools This comprehensive, highly focused reference is a useful and indispensable resource for practitioners, professionals, or researchers in computer science, computer engineering, network design, and network data security.




Blowfish Cipher Tutorials - Herong's Tutorial Examples


Book Description

This tutorial book is a collection of notes and sample codes written by the author while he was learning Blowfish cipher himself. Topics basic concepts of cipher and encryption; introduction of Blowfish cipher algorithm; 8366 Hex Digits of PI; Perl Crypt::Blowfish and Crypt::CBC, Crypt::CFB modules; OpenSSL Blowfish ciphers: bf-ecb, bf-cbc, bf-cfb, bf-ofb; PHP Mcrypt extension; Blowfish CFB-8 and OFB-8 operation modes. Updated in 2024 (Version v2.04) with minor changes. For latest updates and free sample chapters, visit https://www.herongyang.com/Blowfish.




Android Tutorials - Herong's Tutorial Examples


Book Description

This book is a collection of notes and sample codes written by the author while he was learning Android system. Topics include Installing of Android SDK on Windows, Creating and running Android emulators, Developing First Android Application - HelloAndroid, Creating Android Project with 'android' Command, Building, Installing and Running the Debug Binary Package, Inspecting Android Application Package (APK) Files, Using Android Debug Bridge (adb) Tool, Copying files from and to Android device, Understanding Android File Systems, Using Android Java class libraries, Using 'adb logcat' Command for Debugging. Updated in 2023 (Version v3.05) with ADB tutorials. For latest updates and free sample chapters, visit https://www.herongyang.com/Android.




MySQL Tutorials - Herong's Tutorial Examples


Book Description

This MySQL tutorial book is a collection of notes and sample codes written by the author while he was learning MySQL himself, an ideal tutorial guide for beginners. Topics include introduction of Structured Query Language (SQL); installation of MySQL server on Windows, Linux, and macOS; using MySQL client program; accessing MySQL server from PHP, Java and Perl programs; SQL data types, literals, operations, expressions, and functions; Statements of Data Definition Language (DDL), Data Manipulation Language (DML), and Query Language; creating and using indexes; using window functions; stored procedures; transaction management; locks and deadlocks; InnoDB and other storage engines. Updated in 2023 (Version v4.46) with minor changes. For latest updates and free sample chapters, visit https://www.herongyang.com/MySQL.




XSL-FO Tutorials - Herong's Tutorial Examples


Book Description

This book is a collection of tutorial notes and sample codes written by the author while he was learning XSL-FO (Extensible Stylesheet Language - Formatting Objects) himself. Topics include: Introduction to XSL, XSL-FO, and Apache FOP; XSL concepts: Area Model, Inline Stacking and Block Stacking; Page layouts: simple-page-master and page-sequence-master; Page regions: region-body, region-before, region-after, region-start and region-end; Formatting objects: Block-Level and Inline-Level Objects; Adding Graphics from Files and SVG Elements; Managing DPI Resolution; Building Tables of Rows and Columns; Managing Lists of Items and Floating Blocks; Adding External and Internal Hyperlinks; Building Table of Contents; Adding Page Headers and Footers; Managing Fonts: Generic Fonts; Adobe Base-14 Fonts; Embedding Fonts; HTML with SVG and MathML to PDF conversion. Updated in 2024 (Version v2.25) with minor updates. For latest updates and free sample chapters, visit https://www.herongyang.com/XSL-FO.