The openssl-speed utility can be used to measure the efficiency of cryptographic hash algorithms. For this purposes of this exercise, no additional flags or switches were added to the command. Strictly running openssl-speed will attempt a speed test on each supported hash algorithm and output the … [Read more...] about openssl-speed
This post demonstrates how to generate a self-signed certificate with Java and BouncyCastle. There are numerous posts online about how to generate a self-signed certificate using the Java Keytool, so I won’t cover that here. Instead, you may be looking for how to generate a self-signed certificate … [Read more...] about How to generate a self-signed certificate with Java and BouncyCastle
The openssl rsa command and utility is used to manage and process RSA keys. Use this command to encrypt decrypt, convert between forms of keys and print contents of the RSA keys. Generate an RSA key with openssl See our posts on generating an RSA key with both genpkey and genrsa. genpkey is … [Read more...] about openssl rsa
Use the openssl genrsa command to generate an RSA private key. The generated RSA private key can be customized by specifying the cipher algorithm and key size. Prime numbers are used in generating the RSA private key. During generation the following symbols will be outputted demonstrating the … [Read more...] about openssl genrsa – Generate RSA keys with OpenSSL
Use the openssl verify function to verify a certificate chain. openssl verify certificate chain To verify a certificate and its chain for a given website with OpenSSL, run the following command: Where -CAfile chain.pem is the downloaded certificate chain installed at the site and … [Read more...] about openssl verify – Verify a certificate and certificate chain
GPG (GNU Privacy Guard), also known as GnuPG, provides the ability to encrypt data with shared secrets as well as with a public/private key pair. Either method of encryption (also known as symmetric or asymmetric encryption) ensures that the encrypted files can only be decrypted by the intended … [Read more...] about GPG encrypt – How to encrypt and decrypt data with GPG
In cryptography, there are different functions to be performed depending on your use case, and in this article, we will cover encryption vs hashing vs salting and when to use each one. Namely encryption, hashing, and salting. This article will attempt to demonstrate when why and how you should use … [Read more...] about Encryption vs Hashing vs Salting – What is the difference?