Pages

This tutorial covers the basics of the science of cryptography. It explains how programmers and network professionals can use cryptography to maintain the privacy of computer data. Starting with the origins of cryptography, it moves on to explain cryptosystems, various traditional and modern ciphers, public key encryption, data integration, message authentication, and digital signatures.

Tuesday 10 March 2020

Command Generate Certificate Signing Request (CSR) with Openssl

openssl req -nodes -newkey rsa:2048 -keyout example.key -out example.csr -subj "/emailAddress=testing@test.id/C=ID/O=Personal/CN=testing123"

Return --> example.key
-----BEGIN PRIVATE KEY-----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-----END PRIVATE KEY-----
Return example.csr

-----BEGIN CERTIFICATE REQUEST-----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-----END CERTIFICATE REQUEST-----