Cryptography jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,795 cryptography jobs found, pricing in USD

    ...and then re-sends the email secure through port 587/TLS or 465/SSL to the STMP servers at their ISP or Webhost just as any local email client. (Prior to Win8.1 it worked perfectly btw.) Now, in Win8.1/Win10, we are having problem with the module. The front-end GUI to add the main attributes is fine, but when it begins to process email we get an infinite loop of Cryptography errors: Unable to verify signature! Error 80090020:CryptSetKeyParam in Error 8009000B:CryptCreateHash in clsCrypt.Hash_SHAMDS Error 57: CryptAcquireContext in Fatal Alert 20 Session hash appears to be compromised Error 57: CryptGetHashParam in clsCrypt.SHA1_GetHash Here's the utility exe:

    $285 (Avg Bid)
    $285 Avg Bid
    4 bids

    It is a Cryptography Project. Please see the attached details.

    $70 (Avg Bid)
    $70 Avg Bid
    1 bids

    Are you an experienced Android expert? Or just a Java developer who likes creating ver.../>- knowledge of Java API<br />- excellent knowledge of Android API<br />- excellent knowledge of data structures and algorithms provided by the APIs<br />- basic knowledge in complexity theory<br />- excellent understanding of concurrency problems<br />- basic knowledge of software architecture<br />- excellent knowledge of dev environments and debugging with Android Studio<br />- basic knowledge of cryptography<br />- excellent feeling for User Interface Design and UX<br /><br />Additionally, people with the following skills/properties have an advantage:<br /><br />- dip...

    N/A
    N/A
    0 bids

    Are you an experienced iOS app expert? Or just an Ob...development<br />- excellent knowledge of iOS APIs and mobile development<br />- excellent knowledge of data structures and algorithms provided by the APIs<br />- basic knowledge in complexity theory<br />- excellent understanding of concurrency problems<br />- basic knowledge of software architecture<br />- excellent knowledge of dev environments and debugging with XCode 6<br />- basic knowledge of cryptography<br />- excellent feeling for User Interface Design and UX<br /><br />Additionally, people with the following skills/properties have an advantage:<br /><br />- diploma or masters degree in Informatics or Co...

    N/A
    N/A
    0 bids

    Design a logo for company, which specializes in IT consulting, cryptography and security.

    $38 (Avg Bid)
    $38 Avg Bid
    88 bids

    i need assistance in implementation, my topic is related to Optimization techniques for security in MANET by using cryptography. I need an extension in the base paper attached, Idea is to extend the paper by applying brute force analysis on the algorithm proposed in the paper as it will be a new work. I would require a plan of implementation and the codes and explanation.

    $216 (Avg Bid)
    $216 Avg Bid
    2 bids

    Looking for high level team or single develope (s) who are expert in c++/c#/cryptography and have experience in web browser development (preferable from Belarus and Russia), With possibility to work abroad, and with perspective to be hired on monthly based as software developer. Need to develop a web browser from the scratch or to use some engine only based on BSD/MIT License with custom options (more details under discussion) Possibly to move in office abroad. Average Budget 15 000 usd. Waiting for bids only from serious and skilled developers

    $20828 (Avg Bid)
    $20828 Avg Bid
    24 bids

    I need a research paper on the topic " Key generation in RSA cryptography. The paper should be completely authentic and genuine.

    $30 - $250
    Sealed
    $30 - $250
    22 bids

    Details attached. I need help to solve these 4 questions. Please read it before u bid. Thanks

    $169 (Avg Bid)
    $169 Avg Bid
    9 bids

    This is an assignment on Network security related topics. I have attached the question sheet. It should be done in another 12 hours. Only those who are from Computer Science and have taken "Network security" in their courses bid for this project.

    $39 (Avg Bid)
    $39 Avg Bid
    3 bids

    The Android operating system includes a customized...same cryptographic libraries, so we need assistance from an experienced iOS developer who can develop code for the iPhone so that our iOS app can create ECDH key pairs using the curve secp256k1, and so that messages created on Android devices can be deciphered on an iPhone (and vice versa). This project requires people with deep knowledge of cryptography on iPhone. If you have this knowledge then please let me know. I have deep knowledge of cryptography, but not of iOS; if you don't have deep knowledge of this area of programming please do not waste your time and mine by making quotes to complete this work. I will provide detailed documentation to people who can demonstrate that they understand the work we r...

    $803 (Avg Bid)
    $803 Avg Bid
    2 bids

    decipher the given code fanyn dv ynmjdyng fan rsvf usrownfn uskunkfyefdsk, fan rsvf onylnuf gdwdcnkun, vs faef fan rdkg, lynn lysr eww gdvfyeufdkc fasjcafv, ekg qdfa nbnyzfadkc nwvn ojf evdgn, rez gnbsfn dfvnwl nkfdynwz fs fan vdkcwn fevh sl ueyyzdkc fan qaswn jkgnyvfekgdkc fs e vjuunvvljw uskuwjvdsk. vfdww, dl fan fevh vsrnfdrnv ynmjdynv jkjvjew uskunkfyefdsk ekg ntonkgdfjyn sl fdrn, fadv uskunkfyefdsk vasjwg ksf cs sk jkdkfnyyjofng; fan iyedk vasjwg ksf in yeuhng sbny-ektdsjvwz. lsy ntunvvdbn oedkv ekg oyswskcng rnkfew nllsyf iydkc sk iyedk-lec, vs faef fan rdkg dv elfnyqeygv wnvv ldf lsy fanvn fadkcv ekg euusrowdvanv ksfadkc. … fadv aev slfnk innk rz ntonydnkun ef vjua fdrnv ev d uern josk oeyfdujweywz dkbswbng udoanyv, dk fan qsyhdkc-sjf sl fanvn. lsy elfny vonkgd...

    $23 (Avg Bid)
    $23 Avg Bid
    3 bids

    ...UI/UX of encryption system for the 3 major mobile platforms: This will include a website to boot. This site will be providing some needed web services as seen on the example e.g http://www.boxcryptor.com. Please take a look at that site above also pay attention to the details in the attachment. We want to build a solid team for ongoing work with you. An understanding of secure coding and cryptography is needed. There will be a need for stand-up and daily review of all work. We like solid, determined and self starters. You will be expected to contribute in the optimization of the technology in question. Key areas that you must posses the knowledge are: 1. Knowledge of file compression algorithm knowledge. 2. Knowledge of AES and modification. 3. Knowledge of Key mana...

    $4672 (Avg Bid)
    Urgent
    $4672 Avg Bid
    19 bids

    I need help with 2 cryptography questions attached. Please read before u bid. i need it done urgently

    $114 (Avg Bid)
    $114 Avg Bid
    17 bids

    Hello Freelancers , I want to create a website that make the user to upload .vbs file and encrypt all the data inside that file. The website must have multi engine to do crypting. High priority is cryptography. more details later.

    $663 (Avg Bid)
    $663 Avg Bid
    6 bids

    Please only bid after reading proposal. I attached it. I will select reasoanble price

    $373 (Avg Bid)
    $373 Avg Bid
    5 bids

    Looking for a skilled and qualif...traversal (I)HTTP response splitting (J)Arbitrary redirection (K)Sensitive cookies permitted to be sent over insecure channels (L)Insecure third party domain access and cross domain policies (M)Server execution of user-uploaded files (N)Unauthorized privilege escalation (O)Use of HTTPS using other than SSLv3 or TLS (P)Returning verbose error information to clients (Q)Exposing cryptography errors to client (e.g. incorrect padding) (R)Use of SSL/TLS with null ciphers or ciphers using symmetric keys of less than 128 bits in length (S)ViewStates not encrypted with session-specific elements incorporated into the encryption key The successful Freelancer will be required to sign a NDA before commencing works. ...

    $355 (Avg Bid)
    $355 Avg Bid
    16 bids

    Implement CBC mode encryption and decryption using DES block cipher, Collectively crack a DES key. Have to complete segments of code (method signature given, need to complete it). There is an option to use python, C++, and Java. Java is the most preferred.

    $193 (Avg Bid)
    $193 Avg Bid
    8 bids

    will attach problems using this book Hankerson et al., Coding Theory and Cryptography: The Essentials. Second Edition, Marcel Dekker, 2000.

    $17 (Avg Bid)
    $17 Avg Bid
    7 bids

    Implement CBC mode encryption and decryption using DES block cipher, Collectively crack a DES key. Have to complete segments of code (method signature given, need to complete it). There is an option to use python, C++, and Java. Java is the most preferred.

    $134 (Avg Bid)
    $134 Avg Bid
    7 bids

    Card EMV / EMV ISO-7816 & Smart Card Java Card Software Engineer n& Programming & Electronic Engineers & Microcontroller & Cryptography nn Look what I need :nnrnrn1. PIN Project nnI need a Software with wich I can just read the PIN from a Smart Card ( a Bank Card ) wich can be a SDA or DDA card. Like everybody know, on the Chip & Pin cards or so called EMV Bank Cards the PIN it is on the Chip , the way to extract the PIN , I really don&acirc;€™t know it !n- I do have 2 Smart Card Readers/Writers and I do have a Software ( Java EMV Reader ) so I do know and understand some data from there &acirc;€&bar bar;notice: if somebody can provide a Software with which I can find out the PIN from a Bank SDA or DDA card ,the software mu...

    $288 (Avg Bid)
    $288 Avg Bid
    3 bids

    No Code Needed for this one! EASY & SIMPLE A cryptographer used a 4-bit LFSR to create a stream cipher. She sents the first message: "you left the stove on" to her partner. The first character 'y' of the message is encrypted as 0x3e. What are the tap bits of the cryptographer's LFSR? What is the initial state? Draw a picture of it in ASCII. How is the 'o' encrypted in the message? ================================= Easy & Simple/ C++ Code Perform a chosen plaintext attack to break the RC4 stream cipher. The following files are: rc4, The file called rc4 is a compiled executable which is a homebrew implementation of the ARC4 stream cipher. You can use it like this: $ ./rc4 infile outfile The infile is an input file, which is what is to...

    $24 (Avg Bid)
    $24 Avg Bid
    5 bids

    Hi, I Need 2 Cryptography question , to be solved in next 2 hours Questions are about Caesar Cipher and The Enigma Machine Easy Questions, example given.. Pay is 10$ per question so, 20$ for both questions Note : Don't Bid if you dont agree with budget or Time. Thanks Will Share exact questions with suitable Freelancer..

    $20 / hr (Avg Bid)
    $20 / hr Avg Bid
    2 bids

    I need a software that can create a file 'cert' with Samsung cryptography

    $151 (Avg Bid)
    $151 Avg Bid
    1 bids

    Do you know about cryptography? I have small 7 questions. Please help me.

    $45 (Avg Bid)
    $45 Avg Bid
    6 bids

    Output Feedback Mode, Cipher Feedback Mode, Square-and-Multiply. this is theory questions. no programming need help ASAP

    $25 (Avg Bid)
    $25 Avg Bid
    3 bids

    Use LFSR in this assignment. LFSR refered as Max. Define A(s) as follows: The seed s is a starting state for Max. This is a truly random 4-bit value. Produce A(s) by letting Max generate 64 bits of output. Thus l=64 and n=4 in this case. SHOW that A is not a PRNG by exhibiting a Z which distinguishes A from the true uniform distribution on 64-bit strings. Some property that the outputs of A have that true random 64-bit strings are very unlikely to have. Start by coding up Max and producing some sample data. Can you see a pattern in Max's outputs that true random strings shouldn't have? This is the basis for how your Z will work. Once you have designed your Z, you should implement it and see how well it works. 1. The code for Tom 2. The code for ...

    $93 (Avg Bid)
    $93 Avg Bid
    3 bids

    Security Consultant or Expert...hourly rate ? We are expecting an consultant or expert to work on any of the following areas : 1. Security Metrics 2. Security Threat Metrics 3. Security Threat Controlling Strategies 4. Vulnerability Management 5. Application Security Testing 6. Web Application Firewall ( WAF) 7. Penetration Testing 8. Log Monitoring (SIEM (Security Incident Event Management)) 9. Encryption , cryptography and key management 10. Security Solutions 11. DLP (Data Loss Prevention) 12. Security Configuration Standards 13. Information Security Policies 14. Security Architecture Review 15. Security Design 16. Identity and Access Management 17. Incident Response Plan 18. Digital Forensics 19. Anti Virus and Advanced Anti –Virus ( FireEye...

    $24 / hr (Avg Bid)
    $24 / hr Avg Bid
    25 bids

    Make your own cryptographic distinguisher. Many definitions of security in cryptography involve the concept of a distinguisher. One such definition relates to _pseudorandomness_. Let G be a function which takes an n-bit binary string s and returns an l-bit binary string G(s), where l>n. We think of s as being the seed, G as being a random number generator, and G(s) being the output. The seed s is truly random, but the output G(s) is at best _pseudorandom_. Roughly, G is a pseudorandom number generator (PRNG) if there is no way to differentiate the output of G from a truly random l-bit binary string. Really there is no such thing as a particular output being random or not random. Rather we have to tell whether the distribution that G(s) gives rise to on the set of l-bit binary ...

    $37 / hr (Avg Bid)
    $37 / hr Avg Bid
    3 bids

    Hello ahmsak, how about you an me to improve your present 22% reemployment rate? ;) If your time allows, would have a or a few minor potential projects in mind. :) Projects should suit you since your profile mentions your "widened knowledge and sound interests in the areas of": * artificial intelligence (AI) * C++ * Clojure * cryptography * Erlang * functional and logic programming * Haskell * LISP * logic * Prolog * ... Please don't 'accept' this project, as it's intention is you and me to shortly dicusss / exchange thoughts ( chat or use freelancer.com internal communication system ) on how to create projects here for you! Available would be A.) a small bookmarking project, B.) a small database project, C.) a small ERP project, D.) a small file ...

    $10 (Avg Bid)
    $10 Avg Bid
    1 bids

    We are looking for experienced embedded C Developer that can implement program with elliptic curve cryptography, generate digital signatures etc. The application will be used for devices which have processors ARM Cortex A-7 and ARM Cortex M-0. Also Developer should write project documentation. Developer should have knowledge of C/C++ language (experience more than 5 years). Also he/she must be familiar with Mercurial and Git. Developer should have knowledge in bash, systemd, STL, Protocols: SPI, I2C, UART, USB/CDC. It would be preferable if developer knows about boost, ffmpeg, QT5. More Details about project will be available on the individual interviews.

    $4170 (Avg Bid)
    $4170 Avg Bid
    7 bids

    I want the expert to solve 5 questions on Cryptography topic

    $183 (Avg Bid)
    $183 Avg Bid
    10 bids

    ... - Fabrik 3.3.3 for Joomla Development - Bootstrap CSS for Responsive design - JCE Editor expertise. - Some Parallax skills are an asset. - PHP and MySQL skills for Joomla and our proprietary Backoffice - cURL, JSON, XML API techniques - BTC and Blockchain as protocol - CoinKite (Rich BitcoinWallet Bitcoin API) a) Wallet b) Merchants Elements c) Cryptography AP​I​ ​d) MultiSig e) Scheduling f) Splitting and Autoforwarding (Auto-forwarding will take new deposits into a specific account and send them to another address.) -​ BitKit API​ ​ ​- CoinKite ​API Documentation​ ​- Coinapult (Wallet)​. They use CoinKite API ​functions include LOCK Values in USD EUR (Buy and

    $16 / hr (Avg Bid)
    $16 / hr Avg Bid
    8 bids

    Hello Freelancers , I want to create a website that make the user to upload .vbs file and encrypt all the data inside that file. The website must have multi engine to do crypting. High priority is cryptography. more details later.

    $409 (Avg Bid)
    $409 Avg Bid
    6 bids

    I have three cryptography - math tasks to solve, For this you need knowledge of RSA, Elliptic Curve D-H and Digital Signature Algorithm. For more info contact me

    $70 (Avg Bid)
    $70 Avg Bid
    3 bids

    Hello, I need help with programming. I am looking for an experienced any language programmer who will be able to complete my lab project with professionalism and accurary of the project. The project will need to be done on time and completed with all details done. If you are able to do this I will need you for further projects as well. More details will be provided about the project to the individual bidder. The budget is limited because I am a student. Thanks.

    $103 (Avg Bid)
    $103 Avg Bid
    13 bids

    English Data Security Introduction Hacking Introduction Knowledge of security management   Introduction to Security Management   Familiarity with encryption Familiarity with the access control system   Introduction to Cryptography Introduction to Access Control   Knowledge of network security   Standard Security   Introduction to Network Security Security: Security Standards: NIST     Respectively McAfee Security   HIPAA McAfee secure PCI compliance   Denial of access to the service   Dos- denial of service   Breakthrough Password Breakthrough Wireless Network   Password hacking Wireless Hacking   Injection   Sql Injection XSS   Introduction to intrusion te...

    $80948 (Avg Bid)
    $80948 Avg Bid
    14 bids
    $28 Avg Bid
    22 bids

    Well, i don't have much to help you with, only this... Our name is Cryptost, as the name say, tagline will go Cryptography, the only way to keep you digitally safe. you may, or may not add that tagline, up to you, but because we might change it. we want our logo to be professional, mysterious, and gives a very cryptography feel. colours should be in black, red and silver, shiney silver. standing out in the midst of mystery is something you can look at. Cryptost - reads as Crypto ist , meaning the Cryptographer, we deal with digital privacy, and security. Mainly into bitcoins now. We want our logo in GIF, JPG, vector, the fonts used, PNG(transparent background) and 3d. We need mock ups for us to view and alter. Talk to us, we also need web designed and the gra...

    $20 / hr (Avg Bid)
    $20 / hr Avg Bid
    41 bids

    It is aCryptography Project. please see the attached details.

    $80 (Avg Bid)
    $80 Avg Bid
    2 bids

    ...is to use /dev/random or /dev/urandom on a Linux machine. Code for doing this can be found here: For the purposes of getting random data you are allowed to copy and past this code from the internet (or other code that you might find by Googling). Generating the key will take some time (this is typical in cryptography). You may use other ways of getting random data, but you must convince me that they are cryptographically secure. Once you have the required number of random bytes, the Gen function should write them to a file named "keyfile". This is all Gen must do. Enc: The encryption function reads two files as input. One is the keyfile and one is the plaintext file. It performs the encryption

    $47 (Avg Bid)
    $47 Avg Bid
    9 bids

    cryptography content with proper citation

    $278 (Avg Bid)
    $278 Avg Bid
    11 bids

    ...company that already has an innovative product that is being marketed locally ) • Obtain licensing – We are interested the purchase license for commercially successful product or service and became European distributor/agent. • Get exclusive reseller agreement – Regional management of EU market or part of it. You can conduct your research base on the following industries: • IT • ICT • Cryptography • Micropayments & mobile wallet solutions • Telecommunication * Some of the sources which you can analyze in order to gather relevant information to identify those potential products and services. • Technology reports • Technology oriented news portals, literature and magazines • Business oriented soci...

    $121 (Avg Bid)
    $121 Avg Bid
    11 bids

    i need a report on 27 September Australian Standard time on Cryptography It must cover the following topics (Referencing must be in Harvard style) 1 - Title 2 - Aims of research 3 - Background to the research 4 - Literature Review 5 - Research Problem 6 - Research Questions 7 - Methodology 8 - Potential Outcomes and Limitations 9 - Conclusions 10 - References

    $67 (Avg Bid)
    $67 Avg Bid
    5 bids

    Need someone who knows cryptography well to help with 5 tasks Maple will be used in 2 tasks Budget $100 ASAP More details will send to selected freelancer

    $97 (Avg Bid)
    $97 Avg Bid
    2 bids

    I am looking for a research idea which relates with anyone of the topic below. The bidder must have a clear understanding of the topic and must ...relates with anyone of the topic below. The bidder must have a clear understanding of the topic and must have knowledge of implementing it. Any idea relating with anyone of the topic below is welcome. Cryptography for cloud data trust management Cryptography for cloud data access control Cryptography for privacy preserving data analytics and mining Cryptography for auditing on cloud data management Cryptography for verifiable computing Cryptography for cloud data authentication and authorization Cryptography for secure cloud data storage and deduplication Cryptography fo...

    $106 (Avg Bid)
    $106 Avg Bid
    7 bids

    Need someone who knows cryptography well 5 tasks (2 tasks need to use Maple) Budget $75 ASAP

    $19 - $158
    $19 - $158
    0 bids

    Need someone who knows cryptography well Knowledge of: Symmetric and asymmetric ciphers Transposition ciphers are essential. 5 tasks Budget $75 In 3 days

    $47 (Avg Bid)
    $47 Avg Bid
    1 bids

    Hello freelancers, I need a simple java program performing Manger's oaep attack using cryptography library. I have attached reference book for your guide. You just need to convert algorithm of neutral and some mathematical formulas. I have some code without using cryptography library, you can complete it or start from scratch. Will give to selected freelancer. Deadline : 1 day

    $21 (Avg Bid)
    $21 Avg Bid
    4 bids

    Top cryptography Community Articles