Ciphertext program java client server jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    150 ciphertext program java client server jobs found, pricing in USD

    Let's say if key1 is 64bits and key 2 is also 64bit and key3 = key1 need you to find key1 and key 2 given plaintext and ciphertext So I have set up values problem and you will need to find the key

    $896 (Avg Bid)
    $896 Avg Bid
    11 bids

    The input for the algorithm contains three ciphertext/plaintext (C1,M1) (C2,M2)(C3,M3) and the public parameter (P) of the encryption scheme. The output of the algorithm is the secret key SK = (s, q) which can be used to decrypt ciphertexts.

    $50 (Avg Bid)
    $50 Avg Bid
    1 bids

    Take a sample of Plain text, encrypt this plaintext step by step using AES, you must show each step how it has been done with all tables and codes, till you generate the Ciphertext. the reverse your work step by step until you generate the Plaintext Your plaintext is: “Here you can encrypt a block of bytes with a key using the popular Advanced Encryption

    $40 (Avg Bid)
    $40 Avg Bid
    11 bids

    I have a plain Text with me, and I need that to be converted to a ciphertext and that cipher text has to be converted back to plain text. All this should be done by using AES encryption. All the process should be explained clearly on a document for every round. I need this ASAP.

    $28 (Avg Bid)
    $28 Avg Bid
    13 bids

    Take a sample of Plain text, encrypt this plaintext step by step using AES, you must show each step how it has been done with all tables and codes, till you generate the Ciphertext. the reverse your work step by step until you generate the Plaintext Your plaintext is: “Here you can encrypt a block of bytes with a key using the popular Advanced Encryption

    $33 (Avg Bid)
    $33 Avg Bid
    15 bids

    ...CIPHER) 1. Name of program: [login to view URL] 2. Use command syntax: playfair -e key <[login to view URL]> <[login to view URL]> playfair -d key <[login to view URL]> <[login to view URL]> where -e option is encryption and -d option is decryption 3. Program must cope with special inputs (e.g. replacing 'i' with 'j') during encrypti...

    $116 (Avg Bid)
    $116 Avg Bid
    15 bids

    Part 1 • Input – A given text file for plaintext or ciphertext (assume only 26 letters, no special characters, numbers and punctuations) – 3 substitution ciphers, M1,M2,M3 • M1 – left shift 3 letters • M2 – Plain: a b c d e f g h i j k l m n o p q r s t u v w x y z Cipher: D K V Q F I B J W P E S C X H T M Y A U O L R G Z N • M3 – right shi...

    $39 (Avg Bid)
    $39 Avg Bid
    15 bids

    Develop a tool to automatically cryptanalyze English ciphertext produced by the substitution cipher studied

    $43 (Avg Bid)
    $43 Avg Bid
    4 bids

    Need some one that can get the cipherText and 60% of plain text do determine which crypto algorithm was used also the encryption KEY.

    $555 (Avg Bid)
    $555 Avg Bid
    2 bids

    Implement a trapdoor knapsack encryption scheme. When the program is run, it first asks for the size of the super-increasing knapsack, then the user is asked to enter the value of each ai in the private key. Then, the user is asked to enter a modulus, follows by a multiplier. You will need to check whether condition of the multipllier is satisfied

    $68 (Avg Bid)
    $68 Avg Bid
    4 bids

    ...implement a simplified version of the TLS/SSL protocol in this assignment. Write (Java or C/C++) UDP programs allowing two parties to mutually authenticate each other and establish a secure communication channel. For simplicity, let us call the programs “Host” and “Client”, which are executed by Alice and Bob, respectively. Alice and Bob share a common

    $116 (Avg Bid)
    $116 Avg Bid
    7 bids

    ...(s ^ r) mod p - s is the secret (an integer) to be encrypted using above formula - r is a random 500-bit number - p is a random 500-bit prime number - c is the ciphertext computed using this formula Above design is vulnerable, because attacker can calculate the value of s if he/she got enough pairs of <c, p> values. There are 3 tasks:

    $23 (Avg Bid)
    $23 Avg Bid
    3 bids

    ...(s ^ r) mod p - s is the secret (an integer) to be encrypted using above formula - r is a random 500-bit number - p is a random 500-bit prime number - c is the ciphertext computed using this formula Above design is vulnerable, because attacker can calculate the value of s if he/she got enough pairs of <c, p> values. There are 3 tasks:

    $39 (Avg Bid)
    $39 Avg Bid
    3 bids

    ...txt that has FIVE lines in it: - first 40 characters of the plaintext message of the first ciphertext - key used to encrypt the first ciphertext - first 40 characters of the plaintext message of the second ciphertext - key used to encrypt the second ciphertext - one line description of how you solved it. -------------------------------------

    $66 (Avg Bid)
    $66 Avg Bid
    3 bids

    ...txt that has FIVE lines in it: - first 40 characters of the plaintext message of the first ciphertext - key used to encrypt the first ciphertext - first 40 characters of the plaintext message of the second ciphertext - key used to encrypt the second ciphertext - one line description of how you solved it. -------------------------------------

    $23 - $193
    $23 - $193
    0 bids

    ...c = (s ^ r) mod p - s is the secret (an integer) to be encrypted using above formula - r is a random 500-bit number - p is a random 500-bit prime number - c is the ciphertext computed using this formula Above design is vulnerable, because attacker can calculate the value of s if he/she got enough pairs of <c, p> values. There are 3 tasks:

    $88 (Avg Bid)
    $88 Avg Bid
    6 bids

    ...txt that has FIVE lines in it: - first 40 characters of the plaintext message of the first ciphertext - key used to encrypt the first ciphertext - first 40 characters of the plaintext message of the second ciphertext - key used to encrypt the second ciphertext - one line description of how you solved it. -------------------------------------

    $95 (Avg Bid)
    $95 Avg Bid
    6 bids

    ...used to encrypt the string “Hello world” in each of the files that belong to your group. For simplicity, each ciphertext is divided in two files: keysize X bits group [login to view URL], and keysize X bits group Y.iv. The former contains the ciphertext, and the latter the initialization vector. You only need to work on files associated with your group. You can

    $30 (Avg Bid)
    $30 Avg Bid
    7 bids

    ...decrypt it and save both plaintext and ciphertext to the output file or create new text file if no file path was provided. ii. Measure the time taken for both encryption and decryption. iii. Each method core method should have a time measure. • Output: i. Time complexity report. ii. Plaintext and ciphertext 2. The parallel Implementation

    $83 (Avg Bid)
    $83 Avg Bid
    3 bids

    ...used to encrypt the string “Hello world” in each of the files that belong to your group. For simplicity, each ciphertext is divided in two files: keysize X bits group [login to view URL], and keysize X bits group Y.iv. The former contains the ciphertext, and the latter the initialization vector. You only need to work on files associated with your group. You can

    $28 (Avg Bid)
    $28 Avg Bid
    3 bids

    ...developed for Windows . Create a program to encrypt and decrypt binary files using S-DES (Simplified DES) in the Cipher Block Chaining mode. The program takes the input of an initial key and an initial vector, reads the plaintext or ciphertext from a file, conducts the encryption or decryption, and writes the resulting ciphertext or plaintext into a second

    $120 (Avg Bid)
    $120 Avg Bid
    13 bids

    ... a program to encrypt and decrypt binary files using S-DES (Simplified DES) in the Cipher Block Chaining mode. The program takes the input of an initial key and an initial vector, reads the plaintext or ciphertext from a file, conducts the encryption or decryption, and writes the resulting ciphertext or

    $136 (Avg Bid)
    $136 Avg Bid
    5 bids

    ...decrypt it and save both plaintext and ciphertext to the output file or create new text file if no file path was provided. ii. Measure the time taken for both encryption and decryption. iii. Each method core method should have a time measure. • Output: i. Time complexity report. ii. Plaintext and ciphertext 2. The parallel Implementation

    $51 (Avg Bid)
    $51 Avg Bid
    3 bids

    An Efficient Privacy-Preserving Ranked Keyword Search Method. Cloud data owners prefer to outsource documents in an encrypted form for the purpos...Method. Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop efficient and reliable ciphertext search techniques.

    $418 (Avg Bid)
    $418 Avg Bid
    13 bids

    ...and check if plaintext is well formed under padding (yes or no). 3. Repeat step 1. This time, launch the padding oracle attack (PKCS#7) to gain plaintext (attacker knows ciphertext, IV, and length of plaintext, try to find plaintext) I will send you more detailed instruction. Most information are same. Give necessary comments in the code. One day

    $177 (Avg Bid)
    $177 Avg Bid
    7 bids

    ...writing a program that implements cipher. "Choose a substitution cipher and call it CIPHER. Write a C (or any common language) program that implements your CIPHER. Write a C (or any common language) program CRACKER that uses the letter frequency count method to decrypt the ciphertext generated by your CIPHER. CRACKER should take as input a ciphertext ctex...

    $15 - $15
    $15 - $15
    0 bids

    ...cipher and call it CIPHER. Write a C (or any common language) program that implements your CIPHER. Write a C (or any common language) program CRACKER that uses the letter frequency count method to decrypt the ciphertext generated by your CIPHER. CRACKER should take as input a ciphertext ctext generated by CIPHER and return a "decrypted" form of ctext

    $446 (Avg Bid)
    $446 Avg Bid
    13 bids

    ...this assignment you'll write a program that encrypts the alphabetic letters in a file using the Hill cipher where the Hill matrix can be any size from 2 x 2 up to 9 x 9. Your program will take two command line parameters containing the names of the file storing the encryption key and the file to be encrypted. The program must generate output to the console

    $26 (Avg Bid)
    $26 Avg Bid
    3 bids

    ...and decrypt messages shared between each other. – Each message during Internet transmission must be encrypted using a 56-bit key. You can use any computer language (Java, C++, Python) and leverage any existing opensource software, tools, or commands (e.g., md5sum, sha1sum) to design the system. Design Issues • With a 56-bit key, what

    $99 (Avg Bid)
    $99 Avg Bid
    5 bids

    Video steganography using Java. The message will first need to encrypted using RC4 and then the ciphertext will be embed into a ".flv" video . The ciphertext is then need to be able to extract it from the video and decrypt it using RC4. User should be able to enter the plaintext and key to encrypt and decrypt

    $129 (Avg Bid)
    $129 Avg Bid
    2 bids

    ...plain text supplied by the attacker but would not disclose the secret key it uses to encrypt the plain text. In such scenario, one could ask whether, given enough plaintext-ciphertext, pairs, the attacker could figure out the secret key or not. The following two problems will assume certain oracles that can perform certain tasks when queried, and the goal

    $211 (Avg Bid)
    $211 Avg Bid
    12 bids

    TripleSDES The DES algorithm uses keys of length 56 bits, which, when DES was originally designed, was thought to be secure enough to meet most needs. However,...TripleSDES encryption. public static byte[] Encrypt( byte[] rawkey1, byte[] rawkey2, byte[] plaintext ) public static byte[] Decrypt( byte[] rawkey1, byte[] rawkey2, byte[] ciphertext )

    $243 (Avg Bid)
    $243 Avg Bid
    20 bids

    Video steganography using Java. The message will first need to encrypted using RC4 and then the ciphertext will be embed into a ".flv" video . The ciphertext is then need to be able to extract it from the video and decrypt it using RC4. User should be able to enter the plaintext and key to encrypt and decrypt.

    $161 (Avg Bid)
    $161 Avg Bid
    7 bids

    Video steganography using Java. The message will first need to encrypted using RC4 and then the ciphertext will be embed into a ".flv" video . The ciphertext is then need to be able to extract it from the video and decrypt it using RC4. User should be able to enter the plaintext and key to encrypt and decrypt.

    $144 (Avg Bid)
    $144 Avg Bid
    6 bids

    Video steganography using Java. The message will first need to encrypted using RC4 and then the ciphertext will be embed into a ".flv" video . The ciphertext is then need to be able to extract it from the video and decrypt it using RC4. User should be able to enter the plaintext and key to encrypt and decrypt.

    $25 - $211
    $25 - $211
    0 bids

    In this project, you will develop a C++ program to find keys of two files encrypted with AES in ECB mode using brute force key search (exhaustive key search). You will implement the Brute-force Key Search, i.e., you should try all the different combinations of first four bytes of the keys to find the right key (The first 4 bytes of the key are in the

    $117 (Avg Bid)
    $117 Avg Bid
    3 bids

    ...this assignment you'll write a program that encrypts the alphabetic letters in a file using the Hill cipher where the Hill matrix can be any size from 2 x 2 up to 9 x 9. Your program will take two command line parameters containing the names of the file storing the encryption key and the file to be encrypted. The program must generate output to the console

    $30 (Avg Bid)
    $30 Avg Bid
    3 bids

    ...and then we should write C (or any common language) program that implements your CIPHER. afterthat we need to Write a C (or any common language) program CRACKER that uses the letter frequency count method to decrypt the ciphertext generated by your CIPHER. CRACKER should take as input a ciphertext ctext generated by CIPHER and return a "decrypted" form

    $25 (Avg Bid)
    $25 Avg Bid
    2 bids

    Encryption Decryption program Write a program in any language you wish that accepts plaintext, a password (either through prompting the user or on the command line), and whether to encrypt or decrypt. Your program should, if available, use AES with a 128 bit key (derived from the password) in ECB mode to either encrypt or decrypt the plaintext given

    $34 (Avg Bid)
    $34 Avg Bid
    21 bids

    This is an assignment that ...This isn't a difficult project. the objectives are - Secret-key cryptography concepts. - Using/writing programs to encrypt and decrypt different messages (plaintext/ciphertext) - Encryption/decryption algorithms - Encryption modes - Encryption paddings - Initial vectors (IV) this will be using virtual machine.

    $21 (Avg Bid)
    $21 Avg Bid
    2 bids

    ...should be look like as below : For encrypt with HILL CIPHER ENTER PLAINTEXT : HELLO WORLD ENTER KEY TO ENCRYPT : SASH CIPHERTEXT : HGWEAWDSAA TO DECRYPT, THE OUTPUT SHOULD BE LIKE BELOW ENTER CIPHERTEXT TO DECRYPT : HGWEAWDSAA ENTER KEY : SASH PLAIN TEXT : HELLO WORLD There should be three script file to be prepared 1.

    $111 (Avg Bid)
    $111 Avg Bid
    9 bids

    What is the plain text for the following ciphertext, which was encrypted using a simple substitution cipher cjbt coz npon zjv fttk twrtuyfgt nj dtn o xjl, y coz zjv cpjvik dtn o xjl myucn

    $26 (Avg Bid)
    $26 Avg Bid
    6 bids

    I need a matlab code for blowfish algorithm encryption with text file that I can write into it the plaintext to finally get the ciphertext

    $149 (Avg Bid)
    $149 Avg Bid
    12 bids

    ...be able to parse it and get the items I need. The program shall unencrypt the “h2bypOe0AoHFu7mVYuTK5A “ utilizing: public string Decrypt(string cipherText) { int KeyID = 1; string EncryptionKey = getKey(KeyID); byte[] cipherBytes = [login to view URL](cipherText); using (Aes encryptor = [login to view URL]())

    $25 (Avg Bid)
    $25 Avg Bid
    13 bids

    Java program AES-128 bits Specifications: you are required to write the java program “[login to view URL]” to implement the block cipher AES-128. Specifically, your program will read parameters, key, plaintext and ciphertext from a file named “[login to view URL]” (under the same directory of the program). Then your...

    $46 (Avg Bid)
    $46 Avg Bid
    28 bids

    ...decrypt an L-symbol challenge ciphertext computed using a permutation cipher. Informally speaking, your program's goal is to find the plaintext used to compute this ciphertext within a reasonable amount of time. Specifically, your program should print on screen something like "Enter the ciphertext:", obtain the ciphertext from stdin, apply some ...

    $43 (Avg Bid)
    $43 Avg Bid
    3 bids

    I want to decrypt the ciphertext to plain text. I want it to be solved using the PYCIPHER library. The algorithm that it is encrypted in is Ceaser Cipher and Columnar Transposition Here are some suggestions to solve it: Part I: Implement a code that enumerates (in a list) all possible permutations of decrypted message. Note that this list does

    $53 (Avg Bid)
    $53 Avg Bid
    7 bids

    ...Unicode stream cipher that consists of both encryption and decryption algorithms. The encryption program accepts inputs from an existing text file, called “letter.txt.” The encryption program produces an output ciphertext file, called “secret” The decryption program takes “secret” as input and decrypts it into a plaintext, called &...

    $34 (Avg Bid)
    $34 Avg Bid
    6 bids

    ...consists of both encryption and decryption algorithms. The encryption program accepts inputs from an existing text file, called “letter.txt.” This can have anything in it. The encryption program produces an output ciphertext file, called “secret” The decryption program takes “secret” as input and decrypts it into a plaintex...

    $32 (Avg Bid)
    $32 Avg Bid
    8 bids