Top "Cryptography" questions

CRYPTOGRAPHY MUST BE PROGRAMMING RELATED.

Getting RSA private key from PEM BASE64 Encoded private key file

I have a private key file (PEM BASE64 encoded). I want to use it else where to decrypt some other …

java cryptography certificate x509 pkcs#8
How are software license keys generated?

License keys are the defacto-standard as an anti-piracy measure. To be honest, this strikes me as (in)Security Through Obscurity, …

security cryptography license-key
How to read a PEM RSA private key from .NET

I've got an RSA private key in PEM format, is there a straight forward way to read that from .NET …

c# .net cryptography rsa
C# RSA encryption/decryption with transmission

I've seen plenty of encryption/decryption tutorials and examples on the net in C# that use the System.Security.Cryptography.…

c# cryptography rsa
Why java.security.NoSuchProviderException No such provider: BC?

The jar (bcprov-jdk16-145.jar) has been added to the project, Security.addProvider(new org.bouncycastle.jce.provider.BouncyCastleProvider()) has …

java security cryptography jce
Example of AES using Crypto++

I have been searching the Internet for good c++ AES code sample/tutorial that teaches the basics of the encryption …

c++ encryption cryptography aes crypto++
How to Generate Unique Public and Private Key via RSA

I am building a custom shopping cart where CC numbers and Exp date will be stored in a database until …

c# encryption cryptography rsa key
MD5 is 128 bits but why is it 32 characters?

I read some docs about md5, it said that its 128 bits, but why is it 32 characters? I can't compute the …

hash cryptography md5 cryptographic-hash-function
Using SHA1 and RSA with java.security.Signature vs. MessageDigest and Cipher

I'm trying to understand what the Java java.security.Signature class does. If I compute an SHA1 message digest, and …

java encryption cryptography rsa digital-signature
Is calculating an MD5 hash less CPU intensive than SHA family functions?

Is calculating an MD5 hash less CPU intensive than SHA-1 or SHA-2 on "standard" laptop x86 hardware? I'm interested in …

hash cryptography md5 sha1 sha2