Ciphertext program java client server jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Skills
Languages
    Job State
    143 ciphertext program java client server jobs found, pricing in USD

    Develop a tool to automatically cryptanalyze English ciphertext produced by the substitution cipher studied

    $40 (Avg Bid)
    $40 Avg Bid
    5 bids

    Need some one that can get the cipherText and 60% of plain text do determine which crypto algorithm was used also the encryption KEY.

    $555 (Avg Bid)
    $555 Avg Bid
    2 bids

    Implement a trapdoor knapsack encryption scheme. When the program is run, it first asks for the size of the super-increasing knapsack, then the user is asked to enter the value of each ai in the private key. Then, the user is asked to enter a modulus, follows by a multiplier. You will need to check whether condition of the multipllier is satisfied

    $68 (Avg Bid)
    $68 Avg Bid
    4 bids

    ...implement a simplified version of the TLS/SSL protocol in this assignment. Write (Java or C/C++) UDP programs allowing two parties to mutually authenticate each other and establish a secure communication channel. For simplicity, let us call the programs “Host” and “Client”, which are executed by Alice and Bob, respectively. Alice and Bob share a common

    $116 (Avg Bid)
    $116 Avg Bid
    7 bids

    ...(s ^ r) mod p - s is the secret (an integer) to be encrypted using above formula - r is a random 500-bit number - p is a random 500-bit prime number - c is the ciphertext computed using this formula Above design is vulnerable, because attacker can calculate the value of s if he/she got enough pairs of <c, p> values. There are 3 tasks:

    $23 (Avg Bid)
    $23 Avg Bid
    3 bids

    ...(s ^ r) mod p - s is the secret (an integer) to be encrypted using above formula - r is a random 500-bit number - p is a random 500-bit prime number - c is the ciphertext computed using this formula Above design is vulnerable, because attacker can calculate the value of s if he/she got enough pairs of <c, p> values. There are 3 tasks:

    $39 (Avg Bid)
    $39 Avg Bid
    3 bids

    ...txt that has FIVE lines in it: - first 40 characters of the plaintext message of the first ciphertext - key used to encrypt the first ciphertext - first 40 characters of the plaintext message of the second ciphertext - key used to encrypt the second ciphertext - one line description of how you solved it. -------------------------------------

    $66 (Avg Bid)
    $66 Avg Bid
    3 bids

    ...txt that has FIVE lines in it: - first 40 characters of the plaintext message of the first ciphertext - key used to encrypt the first ciphertext - first 40 characters of the plaintext message of the second ciphertext - key used to encrypt the second ciphertext - one line description of how you solved it. -------------------------------------

    $23 - $193
    $23 - $193
    0 bids

    ...c = (s ^ r) mod p - s is the secret (an integer) to be encrypted using above formula - r is a random 500-bit number - p is a random 500-bit prime number - c is the ciphertext computed using this formula Above design is vulnerable, because attacker can calculate the value of s if he/she got enough pairs of <c, p> values. There are 3 tasks:

    $96 (Avg Bid)
    $96 Avg Bid
    7 bids

    ...txt that has FIVE lines in it: - first 40 characters of the plaintext message of the first ciphertext - key used to encrypt the first ciphertext - first 40 characters of the plaintext message of the second ciphertext - key used to encrypt the second ciphertext - one line description of how you solved it. -------------------------------------

    $95 (Avg Bid)
    $95 Avg Bid
    6 bids

    ...used to encrypt the string “Hello world” in each of the files that belong to your group. For simplicity, each ciphertext is divided in two files: keysize X bits group [login to view URL], and keysize X bits group Y.iv. The former contains the ciphertext, and the latter the initialization vector. You only need to work on files associated with your group. You can

    $30 (Avg Bid)
    $30 Avg Bid
    7 bids

    ...decrypt it and save both plaintext and ciphertext to the output file or create new text file if no file path was provided. ii. Measure the time taken for both encryption and decryption. iii. Each method core method should have a time measure. • Output: i. Time complexity report. ii. Plaintext and ciphertext 2. The parallel Implementation

    $83 (Avg Bid)
    $83 Avg Bid
    3 bids

    ...used to encrypt the string “Hello world” in each of the files that belong to your group. For simplicity, each ciphertext is divided in two files: keysize X bits group [login to view URL], and keysize X bits group Y.iv. The former contains the ciphertext, and the latter the initialization vector. You only need to work on files associated with your group. You can

    $28 (Avg Bid)
    $28 Avg Bid
    3 bids

    ...developed for Windows . Create a program to encrypt and decrypt binary files using S-DES (Simplified DES) in the Cipher Block Chaining mode. The program takes the input of an initial key and an initial vector, reads the plaintext or ciphertext from a file, conducts the encryption or decryption, and writes the resulting ciphertext or plaintext into a second

    $114 (Avg Bid)
    $114 Avg Bid
    14 bids

    ... a program to encrypt and decrypt binary files using S-DES (Simplified DES) in the Cipher Block Chaining mode. The program takes the input of an initial key and an initial vector, reads the plaintext or ciphertext from a file, conducts the encryption or decryption, and writes the resulting ciphertext or

    $118 (Avg Bid)
    $118 Avg Bid
    6 bids

    ...decrypt it and save both plaintext and ciphertext to the output file or create new text file if no file path was provided. ii. Measure the time taken for both encryption and decryption. iii. Each method core method should have a time measure. • Output: i. Time complexity report. ii. Plaintext and ciphertext 2. The parallel Implementation

    $51 (Avg Bid)
    $51 Avg Bid
    3 bids

    An Efficient Privacy-Preserving Ranked Keyword Search Method. Cloud data owners prefer to outsource documents in an encrypted form for the purpos...Method. Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop efficient and reliable ciphertext search techniques.

    $418 (Avg Bid)
    $418 Avg Bid
    13 bids

    ...and check if plaintext is well formed under padding (yes or no). 3. Repeat step 1. This time, launch the padding oracle attack (PKCS#7) to gain plaintext (attacker knows ciphertext, IV, and length of plaintext, try to find plaintext) I will send you more detailed instruction. Most information are same. Give necessary comments in the code. One day

    $177 (Avg Bid)
    $177 Avg Bid
    7 bids

    ...text file containing the target ciphertext (given as command-line argument), it should print the encryption key and the decrypted plaintext without any user interaction. Test your code on the following ciphertexts, and answer these questions: (a) What is the key of the cipher? (b) What is the decrypted plaintext? Ciphertext 1 (shift cipher) ODKBFAXAS

    $107 (Avg Bid)
    $107 Avg Bid
    12 bids

    ...writing a program that implements cipher. "Choose a substitution cipher and call it CIPHER. Write a C (or any common language) program that implements your CIPHER. Write a C (or any common language) program CRACKER that uses the letter frequency count method to decrypt the ciphertext generated by your CIPHER. CRACKER should take as input a ciphertext ctex...

    $15 - $15
    $15 - $15
    0 bids

    ...cipher and call it CIPHER. Write a C (or any common language) program that implements your CIPHER. Write a C (or any common language) program CRACKER that uses the letter frequency count method to decrypt the ciphertext generated by your CIPHER. CRACKER should take as input a ciphertext ctext generated by CIPHER and return a "decrypted" form of ctext

    $446 (Avg Bid)
    $446 Avg Bid
    13 bids

    ...this assignment you'll write a program that encrypts the alphabetic letters in a file using the Hill cipher where the Hill matrix can be any size from 2 x 2 up to 9 x 9. Your program will take two command line parameters containing the names of the file storing the encryption key and the file to be encrypted. The program must generate output to the console

    $26 (Avg Bid)
    $26 Avg Bid
    3 bids

    ...and decrypt messages shared between each other. – Each message during Internet transmission must be encrypted using a 56-bit key. You can use any computer language (Java, C++, Python) and leverage any existing opensource software, tools, or commands (e.g., md5sum, sha1sum) to design the system. Design Issues • With a 56-bit key, what

    $99 (Avg Bid)
    $99 Avg Bid
    5 bids

    Video steganography using Java. The message will first need to encrypted using RC4 and then the ciphertext will be embed into a ".flv" video . The ciphertext is then need to be able to extract it from the video and decrypt it using RC4. User should be able to enter the plaintext and key to encrypt and decrypt

    $129 (Avg Bid)
    $129 Avg Bid
    2 bids

    ...plain text supplied by the attacker but would not disclose the secret key it uses to encrypt the plain text. In such scenario, one could ask whether, given enough plaintext-ciphertext, pairs, the attacker could figure out the secret key or not. The following two problems will assume certain oracles that can perform certain tasks when queried, and the goal

    $211 (Avg Bid)
    $211 Avg Bid
    12 bids

    TripleSDES The DES algorithm uses keys of length 56 bits, which, when DES was originally designed, was thought to be secure enough to meet most needs. However,...TripleSDES encryption. public static byte[] Encrypt( byte[] rawkey1, byte[] rawkey2, byte[] plaintext ) public static byte[] Decrypt( byte[] rawkey1, byte[] rawkey2, byte[] ciphertext )

    $243 (Avg Bid)
    $243 Avg Bid
    20 bids

    Video steganography using Java. The message will first need to encrypted using RC4 and then the ciphertext will be embed into a ".flv" video . The ciphertext is then need to be able to extract it from the video and decrypt it using RC4. User should be able to enter the plaintext and key to encrypt and decrypt.

    $161 (Avg Bid)
    $161 Avg Bid
    7 bids

    Video steganography using Java. The message will first need to encrypted using RC4 and then the ciphertext will be embed into a ".flv" video . The ciphertext is then need to be able to extract it from the video and decrypt it using RC4. User should be able to enter the plaintext and key to encrypt and decrypt.

    $144 (Avg Bid)
    $144 Avg Bid
    6 bids

    Video steganography using Java. The message will first need to encrypted using RC4 and then the ciphertext will be embed into a ".flv" video . The ciphertext is then need to be able to extract it from the video and decrypt it using RC4. User should be able to enter the plaintext and key to encrypt and decrypt.

    $25 - $211
    $25 - $211
    0 bids

    In this project, you will develop a C++ program to find keys of two files encrypted with AES in ECB mode using brute force key search (exhaustive key search). You will implement the Brute-force Key Search, i.e., you should try all the different combinations of first four bytes of the keys to find the right key (The first 4 bytes of the key are in the

    $94 (Avg Bid)
    $94 Avg Bid
    4 bids

    ...this assignment you'll write a program that encrypts the alphabetic letters in a file using the Hill cipher where the Hill matrix can be any size from 2 x 2 up to 9 x 9. Your program will take two command line parameters containing the names of the file storing the encryption key and the file to be encrypted. The program must generate output to the console

    $30 (Avg Bid)
    $30 Avg Bid
    3 bids

    ...and then we should write C (or any common language) program that implements your CIPHER. afterthat we need to Write a C (or any common language) program CRACKER that uses the letter frequency count method to decrypt the ciphertext generated by your CIPHER. CRACKER should take as input a ciphertext ctext generated by CIPHER and return a "decrypted" form

    $25 (Avg Bid)
    $25 Avg Bid
    2 bids

    Encryption Decryption program Write a program in any language you wish that accepts plaintext, a password (either through prompting the user or on the command line), and whether to encrypt or decrypt. Your program should, if available, use AES with a 128 bit key (derived from the password) in ECB mode to either encrypt or decrypt the plaintext given

    $34 (Avg Bid)
    $34 Avg Bid
    21 bids

    This is an assignment that ...This isn't a difficult project. the objectives are - Secret-key cryptography concepts. - Using/writing programs to encrypt and decrypt different messages (plaintext/ciphertext) - Encryption/decryption algorithms - Encryption modes - Encryption paddings - Initial vectors (IV) this will be using virtual machine.

    $21 (Avg Bid)
    $21 Avg Bid
    2 bids

    ...should be look like as below : For encrypt with HILL CIPHER ENTER PLAINTEXT : HELLO WORLD ENTER KEY TO ENCRYPT : SASH CIPHERTEXT : HGWEAWDSAA TO DECRYPT, THE OUTPUT SHOULD BE LIKE BELOW ENTER CIPHERTEXT TO DECRYPT : HGWEAWDSAA ENTER KEY : SASH PLAIN TEXT : HELLO WORLD There should be three script file to be prepared 1.

    $111 (Avg Bid)
    $111 Avg Bid
    9 bids

    What is the plain text for the following ciphertext, which was encrypted using a simple substitution cipher cjbt coz npon zjv fttk twrtuyfgt nj dtn o xjl, y coz zjv cpjvik dtn o xjl myucn

    $26 (Avg Bid)
    $26 Avg Bid
    6 bids

    I need a matlab code for blowfish algorithm encryption with text file that I can write into it the plaintext to finally get the ciphertext

    $149 (Avg Bid)
    $149 Avg Bid
    12 bids

    ...be able to parse it and get the items I need. The program shall unencrypt the “h2bypOe0AoHFu7mVYuTK5A “ utilizing: public string Decrypt(string cipherText) { int KeyID = 1; string EncryptionKey = getKey(KeyID); byte[] cipherBytes = [login to view URL](cipherText); using (Aes encryptor = [login to view URL]())

    $25 (Avg Bid)
    $25 Avg Bid
    13 bids

    Java program AES-128 bits Specifications: you are required to write the java program “[login to view URL]” to implement the block cipher AES-128. Specifically, your program will read parameters, key, plaintext and ciphertext from a file named “[login to view URL]” (under the same directory of the program). Then your...

    $47 (Avg Bid)
    $47 Avg Bid
    29 bids

    ...decrypt an L-symbol challenge ciphertext computed using a permutation cipher. Informally speaking, your program's goal is to find the plaintext used to compute this ciphertext within a reasonable amount of time. Specifically, your program should print on screen something like "Enter the ciphertext:", obtain the ciphertext from stdin, apply some ...

    $43 (Avg Bid)
    $43 Avg Bid
    3 bids

    I want to decrypt the ciphertext to plain text. I want it to be solved using the PYCIPHER library. The algorithm that it is encrypted in is Ceaser Cipher and Columnar Transposition Here are some suggestions to solve it: Part I: Implement a code that enumerates (in a list) all possible permutations of decrypted message. Note that this list does

    $53 (Avg Bid)
    $53 Avg Bid
    7 bids

    ...Unicode stream cipher that consists of both encryption and decryption algorithms. The encryption program accepts inputs from an existing text file, called “letter.txt.” The encryption program produces an output ciphertext file, called “secret” The decryption program takes “secret” as input and decrypts it into a plaintext, called &...

    $34 (Avg Bid)
    $34 Avg Bid
    6 bids

    ...consists of both encryption and decryption algorithms. The encryption program accepts inputs from an existing text file, called “letter.txt.” This can have anything in it. The encryption program produces an output ciphertext file, called “secret” The decryption program takes “secret” as input and decrypts it into a plaintex...

    $32 (Avg Bid)
    $32 Avg Bid
    8 bids

    ...stream cipher that consists of both encryption and decryption algorithms. The encryption program accepts inputs from an existing text file, called “letter.txt.” The encryption program produces an output ciphertext file, called “secret” The decryption program takes “secret” as input and decrypts it into a plaintext, called ...

    $87 (Avg Bid)
    $87 Avg Bid
    11 bids

    ...CIPHER (30 points) Choose a substitution cipher and call it CIPHER. Write a C program that implements your CIPHER. Write a C program CRACKER that uses the letter frequency count method to decrypt the ciphertext generated by your CIPHER. CRACKER should take as input a ciphertext ctext generated by CIPHER and return a "decrypted" form of ctext. The decrypti...

    $30 (Avg Bid)
    $30 Avg Bid
    1 bids

    We need generate an algorithm that allow us obtain anyone of the 3 values (plaintext, ciphertext or key) with the other two values. BUT: -The plaintext is an ascii -The ciphertext always is a base64 (one line) -The key is no more than 24 bytes. We don't need a hard encoding, the goal is a short key. Attached you can find an html that explain

    $183 (Avg Bid)
    $183 Avg Bid
    2 bids

    ...mcrypt_encrypt() in /var/www/vhosts/[login to view URL] on line 70" while reading response header from upstream, client: [login to view URL], server: [login to view URL], request: "GET /[login to view URL] HTTP/1.1", upstream: "fastcgi://unix:///var/www/vhosts/system/[login to view URL]:",

    $7 / hr (Avg Bid)
    $7 / hr Avg Bid
    1 bids

    keystream xor-ed with the plaintext gives the ciphertext (encryption)

    $28 (Avg Bid)
    $28 Avg Bid
    7 bids

    Using Java Cryptographic Architecture (JCA) and Java Cryptographic Extensions (JCE) implement the following protocol. Please refer to the lecture slides and online tutorials for completing this assignment. You may also find the following tutorial useful. [login to view URL] 1) Two entitles (Alice

    $164 (Avg Bid)
    $164 Avg Bid
    19 bids