Filtre

Son aramalarım
Şuna göre filtrele:
Bütçe
ile
ile
ile
Beceri
Diller
    İş Durumu
    661 cipher iş bulundu, ücretlendirmeleri EUR

    I have some Question in security course about ( DES , AES , RSA , Feistel Cipher )

    €39 (Avg Bid)
    €39 Ortalama Teklif
    5 teklifler

    ...language program that inputs a sequence of characters from the set A-Z (capital letters only), stores each character in memory after it is transformed by the trivial ROT13 cipher, and then, after character input completes, outputs the transformed characters. A template source code file ([login to view URL]) is provided with this assignment. Edit this

    €49 (Avg Bid)
    €49 Ortalama Teklif
    6 teklifler

    ...code means 'crack the code' achieved through a bespoke (unique) 'code' - lets refer to this as *cipher*. I have developed a *cipher* which converts English words into letters, colours and symbols. There are up to 50 letter/colours/symbols in my unique *cipher* that I need to apply to English words. Here are the project outcomes or User Story that you

    €1752 (Avg Bid)
    €1752 Ortalama Teklif
    10 teklifler

    I have 4 parts to this homework that I need help in, relating to crypto algorithms (playfair cipher, affine cipher, CFB TEA, linear "DES") that is to be programmed in Java.

    €87 (Avg Bid)
    €87 Ortalama Teklif
    12 teklifler

    Looking for someone who knows cipher signing very well. I will attach four (4) photos to this project. Information: The first photo you see is a "GET" request, this clearly just gets the data for that part of the program. The second photo is a "POST" request, this posts the data (this is where it's supposed to SIGN the post to the server) The third

    €27 (Avg Bid)
    €27 Ortalama Teklif
    3 teklifler

    Looking for someone who knows about cipher signing, when visiting an address via a private API it requires a "sign". cipher suite: "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256" This is in python 2/3, I can make changes for either. In your proposal let me know additional information you will need.

    €19 (Avg Bid)
    €19 Ortalama Teklif
    7 teklifler

    i would like to program and enhanced CP-ABE program using java programming language, it involves adding a part to the original source code that would make it support user revocation process. more details will be discussed after agreeing terms

    €135 (Avg Bid)
    €135 Ortalama Teklif
    7 teklifler
    cyber security Bitti left

    ...special characters, numbers and punctuations) – 3 substitution ciphers, M1,M2,M3 • M1 – left shift 3 letters • M2 – Plain: a b c d e f g h i j k l m n o p q r s t u v w x y z Cipher: D K V Q F I B J W P E S C X H T M Y A U O L R G Z N • M3 – right shift 5 letters – cycling pattern • n=3: M1,M3,M2,M3; M1,M3,M2,M3; • Output – Enc...

    €33 (Avg Bid)
    €33 Ortalama Teklif
    15 teklifler

    Need to implement CLOAK protocol(attached) but using MICKEY 2.0 cipher instead of AES. Orientation with python is a must

    €37 (Avg Bid)
    €37 Ortalama Teklif
    5 teklifler

    ...WPA2 Key: (text field and must be 8 or more character) <<< This field needs to create wireless>security>profile> with the following selected WPA2psk Unicast - [login to view URL], group cipher - [login to view URL] Wireless Frequency (drop down list & only display “1 - 2412” , “6 - 2437” , “11 - 2457” Secondary SSID (creates v...

    €257 (Avg Bid)
    €257 Ortalama Teklif
    1 teklifler

    I need to implement AWS security communication between mobile devices using Mickey cipher 2.0 Will attach detailed project description files and source codes to bidders. Deadline is 3 days. I am sure only cryptography & python experts can do that..... Happying bid. deadline 3 days

    €52 (Avg Bid)
    €52 Ortalama Teklif
    1 teklifler

    I need to implement AWS security communication between mobile devices using Mickey cipher 2.0 Will attach detailed project description files and source codes to bidders. Deadline is 3 days. I am sure only cryptography & python experts can do that.

    €34 - €60 / hr
    €34 - €60 / hr
    0 teklifler

    I need to implement AWS security communication between mobile devices using Mickey cipher 2.0 Will attach detailed project description files and source codes to bidders. Deadline is 3 days. I am sure only cryptography & python experts can do that.

    €72 (Avg Bid)
    €72 Ortalama Teklif
    2 teklifler

    I need to implement AWS security communication between mobile devices using Mickey cipher 2.0 Will attach detailed project description files and source codes to bidders. Deadline is 3 days. I am sure only cryptography & python experts can do that.

    €9 - €26
    €9 - €26
    0 teklifler

    I need to implement AWS security communication between mobile devices using Mickey cipher 2.0 Will attach detailed project description files and source codes to bidders. Deadline is 3 days. I am sure only cryptography & python experts can do that.

    €51 (Avg Bid)
    €51 Ortalama Teklif
    2 teklifler

    I'm looking for someone who knows about cipher algorithms. In my console app let's say I do a post request, the post will get rejected because it needs to be signed with a cipher algorithm which I am unsure on how to do myself. If you can implement this into my console app let me know, my budget is not "set in stone" depending on the person, I will

    €51 (Avg Bid)
    €51 Ortalama Teklif
    16 teklifler

    I need to implement AWS security communication between mobile devices using Mickey cipher 2.0 Will attach detailed project description files and source codes to bidders. Deadline is 3 days. I am sure only cryptography & python experts can do that.

    €346 (Avg Bid)
    €346 Ortalama Teklif
    3 teklifler

    I need to implement AWS security communication between mobile devices using Mickey cipher 2.0 Will attach detailed project description files and source codes to bidders. Deadline is 3 days. I am sure only cryptography & python experts can do that.

    €43 / hr (Avg Bid)
    €43 / hr Ortalama Teklif
    8 teklifler

    I need to implement AWS security communication between mobile devices using Mickey cipher 2.0 Will attach detailed project description files and source codes to bidders. Deadline is 3 days. I am sure only cryptography & python experts can do that.

    €47 (Avg Bid)
    €47 Ortalama Teklif
    1 teklifler

    I need to implement AWS security communication between mobile devices using Mickey cipher 2.0 Will attach detailed project description files and source codes to bidders. Deadline is 3 days. I am sure only cryptography & python experts can do that.

    €15 (Avg Bid)
    €15 Ortalama Teklif
    4 teklifler
    Shit chiper Bitti left

    use the shift cipher method for given segment. For more detail, please look into my uploaded picture.

    €9 (Avg Bid)
    €9 Ortalama Teklif
    4 teklifler

    looking to improve my website :- Combine images using CSS sprites, Make fewer HTTP requests, Write cookie, cookie-free domains, write .htaccess for Apac...using CSS sprites, Make fewer HTTP requests, Write cookie, cookie-free domains, write .htaccess for Apache, Content Security Policy, Sub resource Integrity, Key exchange, Cipher, Protocol Support,

    €112 (Avg Bid)
    €112 Ortalama Teklif
    15 teklifler

    I need cipher text search on cloud...using hierarchical clustering algo in this project for doc and index outsourcing on cloud. It need a cloud platform.

    €19 - €157
    €19 - €157
    0 teklifler

    ...Injection (HTTP Headers) CGI Generic SQL Injection (Parameters Names) CGI Generic 2nd Order SQL Injection Detection (potential) SSL Medium Strength Cipher Suites Supported SSL 64-bit Block Size Cipher Suites Supported (SWEET32) SSH Weak Algorithms Supported Web Application Potentially Vulnerable to Clickjacking Web Application Potentially Vulnerable

    €173 (Avg Bid)
    €173 Ortalama Teklif
    11 teklifler

    I've got a bug in my AES cipher encryption class written in Java. Need someone with good java skills and little information about Security algorithms. Thanks in advance. Let's connect! :)

    €24 (Avg Bid)
    €24 Ortalama Teklif
    26 teklifler

    ...multi-modal trip and gets the tickets C) Unifies the tickets into one ticket D) Encrypts the information of the unified ticket using private key into a cipher text of 6 to 10 characters E) Sends the cipher text to the user Please find the visual representation of the architecture here: [login to view URL]

    €424 (Avg Bid)
    €424 Ortalama Teklif
    9 teklifler

    I need you to develop a script for me. Iimplement a python 3 code that decrypts the the encryoted [login to view URL] shall take the cipher text as input and output would be in plain text.

    €21 (Avg Bid)
    €21 Ortalama Teklif
    20 teklifler

    I want make a multi-keyword ranked search on a encrypted cloud environment. First i want to apply hierarchical clustering while indexing then apply search ...hierarchical clustering while indexing then apply search on cloud server by user query. The files as well as index should be outsourced to the cloud with encryption. Then apply cipher text search

    €113 (Avg Bid)
    €113 Ortalama Teklif
    2 teklifler

    Hello, I would like a Caesar cipher wheel designed. It consists of two wheels, one on top of the other. PDF attached to show an example. File type SVG Measurements: Outer wheel diameter 12mm When cut out and stacked, it will look like the one in the picture.

    €9 (Avg Bid)
    Garantili
    €9 Ortalama Teklif
    8 girdi

    There are a lot codes f...are a lot codes for MICKEY V2 cipher in different programming languages including Python however I need 1-Python 3 code easily written with a lot off comments to show how it is work with screenshots. 2-example with data set to show the implementation. 3-I need to be easy to run and fast. 4-Pseudocode for MICKEY cipher V2

    €157 (Avg Bid)
    €157 Ortalama Teklif
    2 teklifler

    ...easy to use. Scenario example: • The user can use the GUI to write a string message. • The user generates the symmetric-key and then encrypt the message. • The cipher text should be displayed on the screen. • The user decrypts the message using the same key, and the plaintext should be displayed on the screen to make sure that the crypto

    €164 (Avg Bid)
    €164 Ortalama Teklif
    20 teklifler

    ...decryptSeed(byte[] encryptedSeed, byte[] encryptionkey, byte[] initVector) throws IOException { byte[] decryptedSeed = new byte[[login to view URL]]; RijndaelCFB cipher = new RijndaelCFB(encryptionkey, initVector); [login to view URL](encryptedSeed, decryptedSeed); byte[] seed = new byte[20]; DataInputStream

    €24 (Avg Bid)
    €24 Ortalama Teklif
    15 teklifler

    Develop a tool to automatically cryptanalyze English ciphertext produced by the substitution cipher studied

    €37 (Avg Bid)
    €37 Ortalama Teklif
    4 teklifler

    I have 10 cipher text that I think are encrypted with AES CGM (check attachment) I know that the symmetric key is IvKVlyODk8I4VPhWosQtLw== I know the nonce and authentication tag is included in the cipher text, I'm guessing first 12 bytes are nonce (you can see a pattern of repetition) and last 16 bytes are tags because the total payload increased

    €518 (Avg Bid)
    €518 Ortalama Teklif
    9 teklifler

    I have 10 cipher text that are encrypted with AES CTR I know that the symmetric key is IvKVlyODk8I4VPhWosQtLw== I know the IV/Nounce is included in the chipher I want you to show me how I can decrypt the data. To know that you have successfully decrypted the data, some cipher text should contain "Game" when decryted, though most part of the

    €470 (Avg Bid)
    €470 Ortalama Teklif
    11 teklifler

    I have 10 cipher text that are encrypted with AES I know that the symmetric key is IvKVlyODk8I4VPhWosQtLw== I need a professional to find out what kind of aes counter mode is being used to encrypt the data, and the data must contain some kind of nonce/IV or something since the first few bytes are all the same. Also the cipher blocks are all in

    €132 (Avg Bid)
    €132 Ortalama Teklif
    7 teklifler

    Hi Arkabrata D., I noticed your profile and would like to offer you my project. I have some cryptography questions that I found a little bit challengeable: like permutation cipher, shift ciphers etc. I will provide you with the questions over chat.

    €34 (Avg Bid)
    €34 Ortalama Teklif
    1 teklifler

    ... example: • The user can use the GUI to write a string message. (optional) • The user generates the symmetric-key and then encrypt the message. • The cipher text should be displayed on the screen. • The user decrypts the message using the same key, and the plaintext should be displayed on the screen to make sure that the crypto

    €105 (Avg Bid)
    €105 Ortalama Teklif
    6 teklifler

    ... example: • The user can use the GUI to write a string message. (optional) • The user generates the symmetric-key and then encrypt the message. • The cipher text should be displayed on the screen. • The user decrypts the message using the same key, and the plaintext should be displayed on the screen to make sure that the crypto

    €33 / hr (Avg Bid)
    €33 / hr Ortalama Teklif
    12 teklifler

    Hello, I need to activate TLS versions and SSL3 versions on a CentOS Server to have compatibility with old mail clients. We have change this...versions on a CentOS Server to have compatibility with old mail clients. We have change this options on WHM but are not shown on the SSL tests or server ports. We need to check cipher suites to ensure security.

    €34 (Avg Bid)
    €34 Ortalama Teklif
    6 teklifler

    ...your API connections. In addition, we plan to retire the 3DES cipher (a data encryption standard) in production soon. However, the date has not yet been finalized. We will notify you once it has. Please refer your developer or solution provider to our API Best Practices for cipher recommendations, details about TLS 1.2 platform support, and other

    €55 (Avg Bid)
    €55 Ortalama Teklif
    5 teklifler

    I need 5 content posts related to the following: Substitution method, hill cipher etc.

    €43 (Avg Bid)
    €43 Ortalama Teklif
    2 teklifler

    ...encrypt/decrypt given file using a simple XOR cipher with the given key file. So when the XOR cipher is applied to the now encrypted file, it should return the original file in the original format. Given/Inputs: two text files File 1: multiline text file: needs to be encrypted/decrypted with a simple XOR cipher using the key-file given. File 2: Key

    €39 (Avg Bid)
    €39 Ortalama Teklif
    9 teklifler

    Implement Fleissner Grille Cipher in Python 3. Details about Fleissner Grille Cipher will be provided.

    €33 (Avg Bid)
    €33 Ortalama Teklif
    9 teklifler

    We need a Web develoment for our new company based in Asia called Cipher Group Limited. We provide the online forex trading service to retail customer. We would like to see designs that use the color white and Blue (or Water) base. Please reffer to follwoing website we preffer. [login to view URL] [login to view URL] Language

    €1882 (Avg Bid)
    €1882 Ortalama Teklif
    70 teklifler

    Given the provided template, you have to code 5 functions. You need to look at how to write each function and what the provided inputs are for and what type they are also what the required output is, which function is going to return and what type it is.

    €21 (Avg Bid)
    €21 Ortalama Teklif
    5 teklifler

    Given the provided template, you have to code 5 functions. You need to look at how to write each function and what the provided inputs are for and what type they are also what the required output is, which function is going to return and what type it is.

    €22 (Avg Bid)
    €22 Ortalama Teklif
    3 teklifler

    I want a program to cipher text divided in three steps. The first step would be a usual 3x3 Hill cipher using 36 characters, the second step would be taking each entry of the resulting 3x1 vector and change it using a base 6, for example, if the resulting from step 1 is p = [18,9,34] we would change it for [6x3 + 0, 6x1 + 3, 6x5 + 4] rearrange the resulting

    €101 (Avg Bid)
    €101 Ortalama Teklif
    12 teklifler

    I have proposed a Simplified AES that is tested experimentally and compared against multiple cipher. I wish to extend the analysis by providing additional analysis based using the following techniques. - Differential and linear cryptanalysis - Algebraic attacks - Key schedule attacks - Etc .. This will include writing the text that describe

    €88 (Avg Bid)
    €88 Ortalama Teklif
    3 teklifler