{"id":9094,"date":"2014-03-09T06:42:01","date_gmt":"2014-03-09T10:42:01","guid":{"rendered":"http:\/\/www.opensource.im\/?p=9094"},"modified":"2014-03-09T06:42:01","modified_gmt":"2014-03-09T10:42:01","slug":"ciphers-in-java-javax-crypto-cipher-tutorialencryption-decryption-with-ciphers-video","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/ciphers-in-java-javax-crypto-cipher-tutorialencryption-decryption-with-ciphers-video.php","title":{"rendered":"Ciphers in Java, javax.crypto.Cipher tutorial,encryption decryption with ciphers &#8211; Video"},"content":{"rendered":"<p><br \/>Ciphers in Java, javax.crypto.Cipher tutorial,encryption decryption with ciphers<br \/><span>Ciphers in Java five confidentiality modes of operation for symmetric key block cipher algorithms The Electronic Codebook Mode (ECB) The Cipher Block Chainin...<\/span><span><\/p>\n<p>By: <\/span>Zariga Tongy<span style=\"color: #666666; font-size: 11px;\"<br \/><!-- Auto Generated --><\/p>\n<p>Read the rest here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.youtube.com\/watch?v=X83RVlL5sdc\" title=\"Ciphers in Java, javax.crypto.Cipher tutorial,encryption decryption with ciphers - Video\">Ciphers in Java, javax.crypto.Cipher tutorial,encryption decryption with ciphers - Video<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Ciphers in Java, javax.crypto.Cipher tutorial,encryption decryption with ciphers Ciphers in Java five confidentiality modes of operation for symmetric key block cipher algorithms The Electronic Codebook Mode (ECB) The Cipher Block Chainin... By: Zariga Tongy<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-9094","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/9094"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=9094"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/9094\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=9094"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=9094"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=9094"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}