Archive for the ‘cryptography’ Category

File Security using Advance Encryption Standards (AES) Keys and Initialization Vector (iv).

This article is all about encryption decryption of a file using AES Keys plus Initialization Vector.

Remember AES is a symmetric key Algorithm.

After Reading this article you will be able to Understand:

1.How to Encode Decode a File with the Generated Key pair.

2.How to generate KEY PAIR (AES+IV)

3.How to Encrypt a file using AES generated key pair.

4.How to Decrypt a File using AES generated key pair.



In this article i am going to show you how to create Digital certificate using openssl command line tool.we will also learn how to generate 4096 bit Private key using RSA Algorithm and we will also learn how to create self signed ROOT CA Certificate through which we will provide an Identity for ROOT CA.
We will learn how to generate an another 4096 bit Private key which will be used to generate our subordinate CA which will used for actual signing.

We will also learn how to request a certificate for subordinate CA. We will also also learn how to decode certificates on your own computer, run this OpenSSL command.

I will show you how to check a certificate and key before applying them to your server.We will learn to Check the SSL key and verify the consistency.

We will also learn how to Check a certificate and return information about it (signing authority, expiration date, etc.).

Also see how to Verify the CSR and print CSR data filled in when generating the CSR.


Here I am going to Introduce Asymmetric encryption decryption technology with an example lab in Redhat Enterprise Linux.
So I will show you how to create Private key and how to create Public Key.Also we will learn how to encrypt a file using Publick Key
and How to Decrypt it using Private key. So Basically We use Public Key for Encryption and Private key For Decryption.We will also learn how to password protect the Private key and how to remove the password from private key.I have used openssl command line tool to perform all this private key public key encryption decryption Lab. (more…)