Ciphertext program java client server jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Skills
Languages
    Job State
    141 ciphertext program java client server jobs found, pricing in USD

    Implement a trapdoor knapsack encryption scheme. When the program is run, it first asks for the size of the super-increasing knapsack, then the user is asked to enter the value of each ai in the private key. Then, the user is asked to enter a modulus, follows by a multiplier. You will need to check whether condition of the multipllier is satisfied

    $66 (Avg Bid)
    $66 Avg Bid
    4 bids

    ...implement a simplified version of the TLS/SSL protocol in this assignment. Write (Java or C/C++) UDP programs allowing two parties to mutually authenticate each other and establish a secure communication channel. For simplicity, let us call the programs “Host” and “Client”, which are executed by Alice and Bob, respectively. Alice and Bob share a common

    $103 (Avg Bid)
    $103 Avg Bid
    8 bids

    ...(s ^ r) mod p - s is the secret (an integer) to be encrypted using above formula - r is a random 500-bit number - p is a random 500-bit prime number - c is the ciphertext computed using this formula Above design is vulnerable, because attacker can calculate the value of s if he/she got enough pairs of <c, p> values. There are 3 tasks:

    $20 (Avg Bid)
    $20 Avg Bid
    4 bids

    ...(s ^ r) mod p - s is the secret (an integer) to be encrypted using above formula - r is a random 500-bit number - p is a random 500-bit prime number - c is the ciphertext computed using this formula Above design is vulnerable, because attacker can calculate the value of s if he/she got enough pairs of <c, p> values. There are 3 tasks:

    $31 (Avg Bid)
    $31 Avg Bid
    4 bids

    ...txt that has FIVE lines in it: - first 40 characters of the plaintext message of the first ciphertext - key used to encrypt the first ciphertext - first 40 characters of the plaintext message of the second ciphertext - key used to encrypt the second ciphertext - one line description of how you solved it. -------------------------------------

    $56 (Avg Bid)
    $56 Avg Bid
    4 bids

    ...txt that has FIVE lines in it: - first 40 characters of the plaintext message of the first ciphertext - key used to encrypt the first ciphertext - first 40 characters of the plaintext message of the second ciphertext - key used to encrypt the second ciphertext - one line description of how you solved it. -------------------------------------

    $23 - $195
    $23 - $195
    0 bids

    ...c = (s ^ r) mod p - s is the secret (an integer) to be encrypted using above formula - r is a random 500-bit number - p is a random 500-bit prime number - c is the ciphertext computed using this formula Above design is vulnerable, because attacker can calculate the value of s if he/she got enough pairs of <c, p> values. There are 3 tasks:

    $93 (Avg Bid)
    $93 Avg Bid
    7 bids

    ...txt that has FIVE lines in it: - first 40 characters of the plaintext message of the first ciphertext - key used to encrypt the first ciphertext - first 40 characters of the plaintext message of the second ciphertext - key used to encrypt the second ciphertext - one line description of how you solved it. -------------------------------------

    $98 (Avg Bid)
    $98 Avg Bid
    6 bids

    ...used to encrypt the string “Hello world” in each of the files that belong to your group. For simplicity, each ciphertext is divided in two files: keysize X bits group [url removed, login to view], and keysize X bits group Y.iv. The former contains the ciphertext, and the latter the initialization vector. You only need to work on files associated with your group. Yo...

    $30 (Avg Bid)
    $30 Avg Bid
    7 bids

    ...decrypt it and save both plaintext and ciphertext to the output file or create new text file if no file path was provided. ii. Measure the time taken for both encryption and decryption. iii. Each method core method should have a time measure. • Output: i. Time complexity report. ii. Plaintext and ciphertext 2. The parallel Implementation

    $82 (Avg Bid)
    $82 Avg Bid
    4 bids

    ...used to encrypt the string “Hello world” in each of the files that belong to your group. For simplicity, each ciphertext is divided in two files: keysize X bits group [url removed, login to view], and keysize X bits group Y.iv. The former contains the ciphertext, and the latter the initialization vector. You only need to work on files associated with your group. Yo...

    $28 (Avg Bid)
    $28 Avg Bid
    3 bids

    ...developed for Windows . Create a program to encrypt and decrypt binary files using S-DES (Simplified DES) in the Cipher Block Chaining mode. The program takes the input of an initial key and an initial vector, reads the plaintext or ciphertext from a file, conducts the encryption or decryption, and writes the resulting ciphertext or plaintext into a second

    $114 (Avg Bid)
    $114 Avg Bid
    14 bids

    ... a program to encrypt and decrypt binary files using S-DES (Simplified DES) in the Cipher Block Chaining mode. The program takes the input of an initial key and an initial vector, reads the plaintext or ciphertext from a file, conducts the encryption or decryption, and writes the resulting ciphertext or

    $147 (Avg Bid)
    $147 Avg Bid
    9 bids

    ...decrypt it and save both plaintext and ciphertext to the output file or create new text file if no file path was provided. ii. Measure the time taken for both encryption and decryption. iii. Each method core method should have a time measure. • Output: i. Time complexity report. ii. Plaintext and ciphertext 2. The parallel Implementation

    $51 (Avg Bid)
    $51 Avg Bid
    3 bids

    An Efficient Privacy-Preserving Ranked Keyword Search Method. Cloud data owners prefer to outsource documents in an encrypted form for the purpos...Method. Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop efficient and reliable ciphertext search techniques.

    $423 (Avg Bid)
    $423 Avg Bid
    14 bids

    ...and check if plaintext is well formed under padding (yes or no). 3. Repeat step 1. This time, launch the padding oracle attack (PKCS#7) to gain plaintext (attacker knows ciphertext, IV, and length of plaintext, try to find plaintext) I will send you more detailed instruction. Most information are same. Give necessary comments in the code. One day

    $165 (Avg Bid)
    $165 Avg Bid
    8 bids

    ...text file containing the target ciphertext (given as command-line argument), it should print the encryption key and the decrypted plaintext without any user interaction. Test your code on the following ciphertexts, and answer these questions: (a) What is the key of the cipher? (b) What is the decrypted plaintext? Ciphertext 1 (shift cipher) ODKBFAXAS

    $116 (Avg Bid)
    $116 Avg Bid
    13 bids

    ...writing a program that implements cipher. "Choose a substitution cipher and call it CIPHER. Write a C (or any common language) program that implements your CIPHER. Write a C (or any common language) program CRACKER that uses the letter frequency count method to decrypt the ciphertext generated by your CIPHER. CRACKER should take as input a ciphertext ctex...

    $15 - $15
    $15 - $15
    0 bids

    ...cipher and call it CIPHER. Write a C (or any common language) program that implements your CIPHER. Write a C (or any common language) program CRACKER that uses the letter frequency count method to decrypt the ciphertext generated by your CIPHER. CRACKER should take as input a ciphertext ctext generated by CIPHER and return a "decrypted" form of ctext

    $434 (Avg Bid)
    $434 Avg Bid
    14 bids

    ...this assignment you'll write a program that encrypts the alphabetic letters in a file using the Hill cipher where the Hill matrix can be any size from 2 x 2 up to 9 x 9. Your program will take two command line parameters containing the names of the file storing the encryption key and the file to be encrypted. The program must generate output to the console

    $26 (Avg Bid)
    $26 Avg Bid
    3 bids