Filtrér

Mine seneste søgninger
Filtrer ved:
Budget
til
til
til
Slags
Færdigheder
Sprog
    Job-status
    2,000 gpg encryption jobs fundet, i prisklassen EUR

    Hi, i need a newly configured server with the latest versions of the apps above. The server should be fast without a GUI. mysql needs to be deaktivated if its currently installed there (what i think it is). postgres access should be restricted to the local maschine and accessible with bash or pgadmin4. Finaly there should run my application with ssl encryption on the tomcat server. the ssl certificate should be auto renewed and a domain configured for the access. It would be great if we can do this job fast so that hopefully i get the new server running within 48 hours from starting the project. i want start the project shortly to finish it this year. I can create milestones if you want. Bests - Thomas I need an invoice before i can pay the final milestone.

    €159 (Avg Bid)
    €159 Gns Bud
    43 bud
    Video Encryption Udløbet left

    I need an expert for video encrypt & decrypt. I will have many projects about videos.

    €109 (Avg Bid)
    €109 Gns Bud
    49 bud

    In this project students are asked to implement a an XTEA Encryption/Decryption VHDL Engine, implemented in both C code and VHDL code. It supposed to be built as a custom hardware module and be interfaced to the NIOS II soft processor in the Alter- Intel Cyclone V FPGA chip [De-10Nano board]. The HDL code implements 2 number of pins: first an input from stdr_logic_vector type form of 32-bit length, and second an output with 32-bit of the same type. The Key is 32-bit in length, and they must be stored inside the VHDL code. The input reception and output generation may take multiple clock cycles or states but could be designed in less than that if was applicable. The internet could be surfed to lookup codes for both C and VHDL but the group is responsible to convert and modify the cod...

    €453 (Avg Bid)
    €453 Gns Bud
    16 bud

    i have javascript code i want to obfusticate it with encryption key and it should still work and then I can decrypt it by the key

    €29 (Avg Bid)
    €29 Gns Bud
    28 bud

    1. The Term Project concerns developing Secure Student Attendance Tracking System (SSATS) having actors: Student, Teacher, Chair, Parent, and System Administrator. Student can view only his/her record. Teacher can enter/modify attendance o...Teacher, Chair, Parent, and System Administrator. Student can view only his/her record. Teacher can enter/modify attendance of students in his/her groups. Chair can view only all Departmental students’ records. Parent can view only records of his/her children-students. System Administrator can create only course-group attendance tables. Data tables are kept on the disk DES-encrypted. Keys for encryption/decryption are created/periodically updated by System Administrator. System Administrator also introduces new user and grants/revokes thei...

    €59 (Avg Bid)
    €59 Gns Bud
    18 bud
    Javascript Rewrite Udløbet left

    First off, I'm not sure if my project request is possible. PLEASE review the following details before you place a bid. I have a small javascript project that works. The issue is that a portion of the script appears (to me) to have been encrypted. What I am seeking is for the script to work, without ANY encryption. I have attached the entire zipped project (3 files). Please note that the "encrypted" part, if that is what it is, begins on line 48 of the "" file. I will be available to respond to any questions. Thank you.

    €18 (Avg Bid)
    €18 Gns Bud
    6 bud

    PLEASE APPLY IF YOU HAD PRIOR EXPERIENCE ON THIS. I am looking for someone to provide me a windows command to encrypt and decrypt a windows file using Gpg4win . should use a password to encrypt/decrypt the file.

    €106 (Avg Bid)
    €106 Gns Bud
    7 bud

    We have our application services developed and deployed across d...implementation and do some security audits 5+ years of experience in implementing API authentication using Oauth2.0 for various grant types 5+ years of experience in architecting and building microservices using Laravel Hands-on experience with CI/CD process across multiple servers Strong understanding and experience with auth technologies such as SAML, Oauth2.0 & OpenID Experience with End to End encryption, Multifactor Authentication (MFA), Single Sign-on (SSO) and Mobile Device Management (MDM) will be considered as a great plus Experience in cloud technology - Azure/AWS/GCP with docker, kubernetes will be considered as a great plus Experience in designing and performing security audits will be considered a...

    €97 (Avg Bid)
    €97 Gns Bud
    6 bud

    Job is to create a project in C++ Builder, add the needed files from Crypto++ stack to make a Salsa and AES-ECB encryption/decryption. Thus a function which can encrypt a text string in Salsa + EAS-ECB, and a function which can decrypt the encrypted text string. You should only bid if you have good experience with C++ Builder. The files can be downloaded at

    €128 (Avg Bid)
    €128 Gns Bud
    16 bud
    PGP encryption Udløbet left

    I have a website that use wordpress, actually the client upload a file in json or excel via an ftp and with a script it import the information to a database under PHP myadmin in WordPress or with a cron we have a export every 5 mins json or excel depend on the script we are using. But we are looking to secure the procedure where the client upload the file as a pgp then we use a script to extract it to json or excel so that our script can import it to the database and same for export, our script export the file in a folder then we concert it in pgp. We use Cpanel environement Please note that we have two type of script it either json or excel.

    €474 (Avg Bid)
    €474 Gns Bud
    35 bud

    When I log in automatically using C # http, I encounter http header authentication. The authentication comes from an encrypted string calculated by the js method on the page. This js method is static, but I can't find which js method is encrypting. I need someone to help me write the encrypted js method into a c # method or a na...When I call this method, I find another way to get the parameter values, input them into the method, and get the final same encrypted string. I am engaged in computer crawler work. I have a lot of work to be outsourced, and the payment fund is stable and reliable. I need to be able to find background developers who use C #+CEFSHARP technology, and senior front-end developers to help me crack encryption parameters, WEBSOCKET and other web communication...

    €490 (Avg Bid)
    €490 Gns Bud
    14 bud

    encryption software to share files with limited license (1..2....) years ... the file is opened by Autodesk program , also I want to secure it when opened by the Autodesk program the file:- Dynamo Script ( .dyn)

    €188 (Avg Bid)
    €188 Gns Bud
    5 bud
    encryption software Udløbet left

    encryption software to share files with limited license (1..2....) years ... the file is opened by Autodesk program , also I want to secure it when opened by Autodesk program the file :- Dynamo Script ( .dyn)

    €184 (Avg Bid)
    €184 Gns Bud
    6 bud

    Hello can you help me with this project it’s going to be similar to lab 4 that I have attached. I have attached the project pdf too ( 193.22 KB) this one Division.c #include "system.h" #include "altera_avalon_pio_regs.h" #include <stdio.h> /* register offset definitions */ #define DVND_REG_OFT 0 // dividend register address offset #define DVSR_REG_OFT 1 // divisor register address offset #define STRT_REG_OFT 2 // start register address offset #define QUOT_REG_OFT 3 #define REMN_REG_OFT 4 #define REDY_REG_OFT 5 #define DONE_REG_OFT 6 /* main program */ int main () { alt_u32 a, b, q, r, ready, done; printf("Division accelerator test #2: nn"); while (1){ printf "Perform division a / b = q remainder rn"); printf("En...

    €571 (Avg Bid)
    €571 Gns Bud
    12 bud

    I want to get real-time stock chart data. But they communicate with encrypted data. I'm looking for someone to unlock the encryption by analyzing the data from the site. JS should be different and have a good understanding of communication.

    €121 (Avg Bid)
    €121 Gns Bud
    15 bud

    From Raspberry Pi 4 model b with sensors like temp, spo2, heartrate collecting data from it and encrypting in the edge level Using Homomorphic Encryption and decryption with the same algorithm while retriveing data from cloud

    €105 (Avg Bid)
    €105 Gns Bud
    6 bud

    ...literally more hackers registrations in my database that actual customers, and I don't know how to stop. I use a Capthcha, but it has not slowed at all... I would need sign up via Facebook and Google and manually on the site, log in with SESSION variables filled with data for customer from page to page. updating address and license information, change password, forgot password, and build in encryption for passwords, currently store raw data. Log database access errors and possibly develop an api to allow me to eventually develop an admin page for me and other helpers to log into to access any info on customers, orders, classes, etc. I am familiar with and have used PDO and parameters, but want it professionally done to minimize holes in security. I want to be able to trus...

    €459 (Avg Bid)
    €459 Gns Bud
    86 bud

    Invisibl...codebase. This task should take less than 10 hours to complete: efficiency is the goal here. Requirements: Looking for a lightweight prototype solution with C# console app projects to demonstrate how Symmetrical & Asymmetrical Encryption works. One C# console app project for Symmetrical Encryption and one C# console app for Asymmetrical Encryption. Each console app would prompt for message and password (if necessary), print the encrypted data and then unencrypt the data (using a password if necessary). You can use SDK nuget packages for RSA and/or AES encryption. No database or cloud hosting required. Technologies: Language(s): C# Library/Framework(s): .NET 6.0, AES , RSA Please deliver the work in the following format(s)...

    €31 / hr (Avg Bid)
    €31 / hr Gns Bud
    13 bud

    You are required to write an application for a simple file transfer between a client and server. The application should have a connection-oriented communication to send a large file...language like C, C++, C# and Java should be preferred. Your aim is to provide a number of services during the file transfer to make it more secure and more robust. Here are the services you need to implement: o Key Exchange (creation of keys and IVs) o Authentication o Confidentiality o Compression You are not required to re-implement algorithms. You are free to choose any available compression, encryption and MAC libraries. You can use PGP as a starting point about the services covered. For sake of simplicity apply all services at once. You can assume that server has a public key and it is known by th...

    €35 (Avg Bid)
    €35 Gns Bud
    8 bud
    PHP website upgrade Udløbet left

    I need a php developer modify a php website from 5.6 to 7.2 and carry out some changes to improve security and some additional functions and bug fixes. The project is pure php...from 5.6 to 7.2 and carry out some changes to improve security and some additional functions and bug fixes. The project is pure php accessing a MySQL database. PHP 7 uses different connection libraries, so this needs fixing first. Once the version upgrade is successful and shown to be fully working, we will need a series of changes making: 1. change password fields in the database and website encryption / display 2. add user reset password and email functionality Code is in GitHub and contributor will be allowed access. We use VirtualBox/Vagrant to test code locally (especially for PHP5.6) and will give inst...

    €283 - €848
    Forseglet
    €283 - €848
    229 bud

    Hello everyone! I’m looking for a way to move a score from RenPy to a webserver using an URL, but in order players not to change it, it has to go encoded. So, the idea is to create a mathematical encryption in Ren'Py so when the player gets a score, the game makes something like this: $ player_score = 250 $ key = (10,99) … do something … $ player_score_encrypted = player_score * key imagebutton auto .... action OpenURL(""+key+"&score="+player_score_encrypted) Then on the server side using PHP: $player_score_encrypted = (isset($_GET['score'])) ? $_GET['score'] : 0; $key = (isset($_GET['key'])) ? $_GET['key'] : 0; $player_score = $ player_score_encrypted / $key; Obviously, this is way to s...

    €18 (Avg Bid)
    €18 Gns Bud
    1 bud

    A reserving room before encryption framework is proposed to provide separable reversible data hiding for encrypted images in this project. An Adaptive grayscale image coding scheme based on dynamic multi-grouping absolute moment block truncation coding (MGAMBTC) is used to enhance the hiding capacity. A receiver with only the hiding key can extract the secret data without knowing about the content. If the receiver has only the encryption key, it is not possible to extract the hidden secret data, but it is possible to decrypt an image similar to the original image. Only when the receiver has both the hiding key and the encryption key, it is possible to extract the secret data and completely recover the original content without any error. The experimental results demons...

    €110 (Avg Bid)
    €110 Gns Bud
    4 bud

    ...controller which will be compared to the 2nd PIN stored in Meta Data Partition. If authentication is successful then Private partition2 will become visible to the host/machine. 3. Meta Data Partition: This is a partition that is only visible to the controller to store data/metadata like pin, encryption keys etc. o Every read & write operation destined for Pp1 & Pp2 partitions should automatically be encrypted/decrypted via the controller (encryption algorithm can be simply Xoring the data). o The key for encryption/decryption & both PINs should be changeable in Meta Data Partition. o IOCTLS should be used to mark any partition as PP1 or PP2 o Once the partition is visible to the host/machine (after authentication) it will behave like normal volumes ...

    €3949 (Avg Bid)
    €3949 Gns Bud
    14 bud

    Tasks: - File architecture with compression & encryption from vb6 UDT binary files & code to convert - Sync SSH form using FSW & 1 timer and needing better methodology and efficiency (zipping) -- Syncing should require utilization of memory management for zipping and unzipping files.

    €175 (Avg Bid)
    €175 Gns Bud
    23 bud

    ...20-30 pages in total including tables and graphs. The key though is to answer the questions in the project description below. It would also help if you have reasonable computer knowledge to understand how data encryption works, because it means you will understand many of the concepts in publicly available market research reports. Please submit proposals quickly as I will likely close it early. *************************** PROJECT DESCRIPTION: I need someone to prepare a report on the current market size, share, level of competition and forecast growth in the data software encryption market in Asia, Americas, Europe, Oceania and Africa regions by key segment. There is a lot of information available right now in research reports, but I don’t have time to collect i...

    €434 (Avg Bid)
    €434 Gns Bud
    35 bud

    * Experience in Matlab , C++, Python * Principle of Symmetric & Asymmetric Cryptography, Hands-on, Technical, Problem Solver. * Evaluate, Analyse and target weakness in cryptographic security system and algorithms. Investigate, research and test new cryptology theories & applications. Develop and update methods for efficient handling of Cryptic process * Experience seeing the entire lifecycle of software products is crucial. Strong experience working with engineering and product development teams.

    €597 (Avg Bid)
    €597 Gns Bud
    7 bud

    Hi Vishal S., I have updated the project now (same description and amount) and will click on Hire Vishal S now, hopefully that works ok. Neill

    €94 (Avg Bid)
    €94 Gns Bud
    1 bud

    Project Description: I am looking for experts who has experience in 1) ST20 (Sti55xx) cpu. 2) Experience in DVB encryption system. expecially, ecm, emm and data exchange (smartcard and STB) in smart card processing I will provide: 1) firmware jtaged from STB (both data in the Flash and RAM). 2) The function/sub-routine that I am looking for to decrypt those data in the firmware The developer needs to: 1) decompile the function/sub-routine that I am looking for into linux c code (example: function.c) 2) provide any additional decompiled function/sub-routine that can be useful for me. we can have detailed interactive discussion over any app if you need to.

    €627 (Avg Bid)
    €627 Gns Bud
    8 bud

    Dear all, I would need a script python script capable of reading the proprietary file in Avanset VCE format. The files rely on SQLITE and encryption. I need to open old archives and transform them to PDF. I attached a file for testing purposes

    €19 (Avg Bid)
    €19 Gns Bud
    9 bud

    ..."","(key)"); decrypt("", "","(key)"); } File encryption must be implemented using the following libraries: Salsa20 HC-256 SOSEMANUK The source code there is written in C, but it can be plugged into c++ and compiled into one file. It also needs optimization of RAM, and the correct read/write file, so that the memory is freed after the encryption of the file. Write code and test it strictly on Linux, because RAM on windows and linux in c++ is optimized differently. Also for clarity, there is an example of file encryption using An example can be found in the

    €414 (Avg Bid)
    Fremhævet Haster NDA
    €414 Gns Bud
    20 bud

    Hello guys, I am looking for skilled FPGA programmer who could implement machine learnin...classification) of tiny metal objects etc on a FPGA SOM module. The FPGA will detect object using data from high resolution camera's (not less than 720P) usb port/camera interface,lidar module (atleast 6 sensor) & ultrasonic sensor module (atleast 7 sensor) i2c line and will be connected to servo motor and BLDC motor ESC. The FPGA should output in low latency H.264/H.265 format with AES 256 encryption/similar. More details will be revealed via chat. The freelancer is free to choose an ideal cost effective FPGA SoM module for this task. Please don't apply if you can't complete the task or unsure about your capacity to match the development task. The project needs to...

    €388 (Avg Bid)
    €388 Gns Bud
    9 bud

    Hi Vishal S., you've done some research for me in the past and I was wondering whether you would be interested in doing something almost identical again (just for a different industry)? I need a list of merger and acquisition plus fundraising transactions involving data encryption companies over the last three years. What was the size of the acquired party in terms and revenue and employees, and what was their valuation on sale or merger or fundraise? Lett me know if you would be up for doing this. Neill

    €93 (Avg Bid)
    €93 Gns Bud
    1 bud

    Hi, i have a bootstrap panel which gives a multi-layer encryption output. I am looking to have the final layer of the output encryption removed. The final layer is AES.

    €26 (Avg Bid)
    €26 Gns Bud
    7 bud

    For the implementation & comparison, we have selected the algorithms DES, 3DES, AES, Blowfish & RSA. For comparison, we have used files of different sizes like 25 KB, 50 KB, 1 MB, 2 MB, and 3 MB. The same input files are used for all encryption algorithms. For evaluation of the performance of various encryption algorithms, the following metrics have been chosen. Encryption time, Decryption time, Avalanche effect, Memory consumption WE REQUIRE ANY PROGRAMMING LANGUAGE CODE IMPLEMENTATION OF THESE ALGORITHMS TO COMPARE THE ABOVE-MENTIONED PARAMETERS.

    €192 (Avg Bid)
    €192 Gns Bud
    24 bud
    Program to encrypt Udløbet left

    Action: In this step, you will implement your own encryption code. You may use a programming language of your choice. Then, you will need to choose a cryptographic library. Then, you will choose an appropriate encryption algorithm. Alternatively, you may a cryptographic utility, and write a shell code. : In this step, you need to implement a method for infecting a victim. Example: A victim may open a phishing email which contains a malicious executable/script as an attachment. 3. Monitoring: To be able to detect a ransomware, we need to be able to monitor your environment. Example: OSSEC Host IDS has a file integrity monitoring functionality. Provide your own detection component 4. Detection: In this stage, you will analyze the data collected by the monitoring co...

    €172 (Avg Bid)
    €172 Gns Bud
    16 bud

    I am looking to hire an experienced C Programming Expert in Operating Systems, Encryption and other advance topics

    €83 (Avg Bid)
    €83 Gns Bud
    9 bud

    ...Also the speed of encryption will be very important, namely because of speed I chose stream algorithm instead of block algorithm. I work with transmitting important files over unsecured channels on a regular basis, at the moment I used and use the usual openssl aes-128-cbc, but the encryption speed leaves much to be desired... Therefore, I need a stable utility, but for Salsa20/SOSEMANUK and that quickly encrypted files that weigh from 1kb up to 50kb +. I would like to see it work in the following variants: 1) Sources c++ which can be compiled into usable variant ELF for linux, so it could be put to /bin folder and used as console openssl, extended fileencryptor -enc -in / -out / -key (256bit key) 2) C++ source code, where file encryption is implemented by

    €456 (Avg Bid)
    €456 Gns Bud
    6 bud

    For the implementation & comparison, we have selected the algorithms DES, 3DES, AES, Blowfish & RSA. For comparison, we have used files of different sizes like 25 KB, 50 KB, 1 MB, 2 MB, and 3 MB. The same input files are used for all encryption algorithms. For evaluation of the performance of various encryption algorithms, the following metrics have been chosen. Encryption time, Decryption time, Avalanche effect, Memory consumption WE REQUIRE ANY PROGRAMMING LANGUAGE CODE IMPLEMENTATION OF THESE ALGORITHMS TO COMPARE THE ABOVE-MENTIONED PARAMETERS.

    €148 (Avg Bid)
    €148 Gns Bud
    6 bud

    ...Test-Driven Development. * Have experience developing well-designed REST APIs. * Understanding of Blockchain architectural design patterns as well as supporting infrastructure. * Expertise in providing end-to-end solutions (Life Cycle for infrastructure including SDLC). * Knowledge of ERC20, ERC721, and other protocols. * In-depth knowledge of blockchain logic. * Understanding of fundamental encryption mechanisms. * Experience in peer-to-peer networking. * Understanding of Smart Contracts and consensus techniques, as well as experience developing blockchain apps or proofs-of-concept (POCs) in Solidity on Ethereum. * Hands-on development expertise in the following areas: Solidity, JavaScript, Golang, and JSON. * A strong interest in blockchain technology and like learning and deve...

    €32 / hr (Avg Bid)
    €32 / hr Gns Bud
    59 bud

    Hey , looking for an encryption expert for a social media app.

    €721 (Avg Bid)
    €721 Gns Bud
    14 bud

    I need to check a bank, where the request is encrypted EAX mode encryption (

    €463 (Avg Bid)
    €463 Gns Bud
    14 bud

    I haveI have an application in JAVA, and I want to convert it to Node.JS Using Crypto. Need to understand AES/CBC , and Diffie-Hellman key

    €152 (Avg Bid)
    Haster
    €152 Gns Bud
    9 bud

    I haveI have an application in JAVA, and I want to convert it to Node.JS Using Crypto. Need to understand AES/CBC

    €462 (Avg Bid)
    €462 Gns Bud
    17 bud

    I need help with Encryption calculations and signatures in Python. I will share more details in chat.

    €37 (Avg Bid)
    €37 Gns Bud
    7 bud
    Work Encryption Udløbet left

    Only Serious people need. Work from home and digital platform like instagram, Facebook, linkedin, etc .

    €2 / hr (Avg Bid)
    €2 / hr Gns Bud
    4 bud

    Looking for a conference paper ( Cryptography/ IoT security/ Network Security/ Federated learning ) ex: 1. A novel Continuous authN in IoT devices , Functional encryption for data privacy etc

    €229 (Avg Bid)
    €229 Gns Bud
    12 bud

    Looking for asp .net website Main Features Send, receive messages. (auto delete message older than 7 days) Group chat Login Registration pages Control Your Settings. Change Profile information. Web login with email Auth Contacts & block user system Search for a particular message or a user Block a User File Sharing (limit 5 MB) User...Your Settings. Change Profile information. Web login with email Auth Contacts & block user system Search for a particular message or a user Block a User File Sharing (limit 5 MB) User should be able to send msg itself to different devices. Adding a payment gateway for Premium feature—monthly payment or onetime payment. Paid feature should have Encrypted chat system- Chats and file sharing with encryption chat history lifetime. Max file s...

    €213 (Avg Bid)
    €213 Gns Bud
    13 bud
    VPN APPLCATON Udløbet left

    Hello Guys, Hope you are doing well. I have been looking for Server Engineer and Application Developer to make application for VPN Access. Windows PC VPN Mac VPN iPhone VPN (iOS) Android VPN APK Router VPN Chrome VPN Extension IPsec with encryption, IPsec with Layer 2 Tunneling Protocol (L2TP), SSL 3.0 or Transport Layer Security (TLS) with encryption, Layer Two Forwarding (L2F) or Point-to-Point Tunneling Protocol (PPTP) Warm Regards, Ashwani Dudeja

    €2303 (Avg Bid)
    €2303 Gns Bud
    13 bud
    Social Media App Udløbet left

    . A new social platform for singles to meet and mingle. We’r...with the founder and a great opportunity to build out your portfolio. Key features to be built: Geo-location enabled Onboarding verification system (think identity and proof of address) to hold the integrity of the platform Twitter-like User profile feed User profile allowing photos, videos, polls, and reels Ability to “follow” and block others, also “like” posts and stories Ability for ads Encryption-capability Roadmap features: Integration with external systems to purchase entertainment tickets (sports, concerts, etc) Allows user to directly purchase and invite others There’s so much that can be done! If any of this interests you, please reach out to Xak with an attached resume an...

    €31971 (Avg Bid)
    €31971 Gns Bud
    81 bud

    ...is much more open to security assaults in the 21st century than it was in the past. Homomorphic encryption, for example, is used to maintain the security and privacy of data in the cloud since it offers greater dependability than other solutions. Despite the fact that Fully Homomorphic Encryption offers improved privacy and security, there are a number of challenges with key management and storage. Therefore, to overcome this drawback homomorphic encryption can be infused with the PSO (Particle Swarm Optimization) algorithm to achieve effective key management. The main motive of the project is to enhance the key generation, sharing, and management process which is done using Homomorphic encryption with the help of the PSO Algorithm. Moreover, Diffe Helman ca...

    €16 / hr (Avg Bid)
    €16 / hr Gns Bud
    6 bud