Encryption jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    12,971 encryption jobs found, pricing in USD

    For the implementation & comparison, we have selected the algorithms DES, 3DES, AES, Blowfish & RSA. For comparison, we have used files of different sizes like 25 KB, 50 KB, 1 MB, 2 MB, and 3 MB. The same input files are used for all encryption algorithms. For evaluation of the performance of various encryption algorithms, the following metrics have been chosen. Encryption time, Decryption time, Avalanche effect, Memory consumption WE REQUIRE ANY PROGRAMMING LANGUAGE CODE IMPLEMENTATION OF THESE ALGORITHMS TO COMPARE THE ABOVE-MENTIONED PARAMETERS.

    $160 (Avg Bid)
    $160 Avg Bid
    10 bids

    For the implementation & comparison, we have selected the algorithms DES, 3DES, AES, Blowfish & RSA. For comparison, we have used files of different sizes like 25 KB, 50 KB, 1 MB, 2 MB, and 3 MB. The same input files are used for all encryption algorithms. For evaluation of the performance of various encryption algorithms, the following metrics have been chosen. Encryption time, Decryption time, Avalanche effect, Memory consumption WE REQUIRE ANY PROGRAMMING LANGUAGE CODE IMPLEMENTATION OF THESE ALGORITHMS TO COMPARE THE ABOVE-MENTIONED PARAMETERS.

    $208 (Avg Bid)
    $208 Avg Bid
    23 bids

    Action: In this step, you will implement your own encryption code. You may use a programming language of your choice. Then, you will need to choose a cryptographic library. Then, you will choose an appropriate encryption algorithm. Alternatively, you may a cryptographic utility, and write a shell code. : In this step, you need to implement a method for infecting a victim. Example: A victim may open a phishing email which contains a malicious executable/script as an attachment. 3. Monitoring: To be able to detect a ransomware, we need to be able to monitor your environment. Example: OSSEC Host IDS has a file integrity monitoring functionality. Provide your own detection component 4. Detection: In this stage, you will analyze the data collected by the monitoring co...

    $180 (Avg Bid)
    $180 Avg Bid
    16 bids

    I am looking to hire an experienced C Programming Expert in Operating Systems, Encryption and other advance topics

    $91 (Avg Bid)
    $91 Avg Bid
    10 bids

    ...Also the speed of encryption will be very important, namely because of speed I chose stream algorithm instead of block algorithm. I work with transmitting important files over unsecured channels on a regular basis, at the moment I used and use the usual openssl aes-128-cbc, but the encryption speed leaves much to be desired... Therefore, I need a stable utility, but for Salsa20/SOSEMANUK and that quickly encrypted files that weigh from 1kb up to 50kb +. I would like to see it work in the following variants: 1) Sources c++ which can be compiled into usable variant ELF for linux, so it could be put to /bin folder and used as console openssl, extended fileencryptor -enc -in / -out / -key (256bit key) 2) C++ source code, where file encryption is implemented by

    $495 (Avg Bid)
    $495 Avg Bid
    6 bids

    I have an issue in laravel while sending messages! The smtp server works only with the local server smtp and the problem that my server send the message only to JUNKS, i tried to fix the issue by importing SENDINBLUE sm...have an issue in laravel while sending messages! The smtp server works only with the local server smtp and the problem that my server send the message only to JUNKS, i tried to fix the issue by importing SENDINBLUE smtp, but i got errors while trying to test it if i add a relay smtp, or any other server, and i click test i got the error: (( Swift_TransportException Unable to connect with TLS encryption )) Im searching only who is the professional to fix this problem by adding SENDINBLUE scripts into my server, or he made anything to let my server accept any kin...

    $29 (Avg Bid)
    $29 Avg Bid
    30 bids

    For the implementation & comparison, we have selected the algorithms DES, 3DES, AES, Blowfish & RSA. For comparison, we have used files of different sizes like 25 KB, 50 KB, 1 MB, 2 MB, and 3 MB. The same input files are used for all encryption algorithms. For evaluation of the performance of various encryption algorithms, the following metrics have been chosen. Encryption time, Decryption time, Avalanche effect, Memory consumption WE REQUIRE ANY PROGRAMMING LANGUAGE CODE IMPLEMENTATION OF THESE ALGORITHMS TO COMPARE THE ABOVE-MENTIONED PARAMETERS.

    $147 (Avg Bid)
    $147 Avg Bid
    8 bids
    Encryption 4 days left

    It is a simple encryption task that needs to be implemented in Java. The attached file provides all the details for the project.

    $115 (Avg Bid)
    $115 Avg Bid
    14 bids

    ...Test-Driven Development. * Have experience developing well-designed REST APIs. * Understanding of Blockchain architectural design patterns as well as supporting infrastructure. * Expertise in providing end-to-end solutions (Life Cycle for infrastructure including SDLC). * Knowledge of ERC20, ERC721, and other protocols. * In-depth knowledge of blockchain logic. * Understanding of fundamental encryption mechanisms. * Experience in peer-to-peer networking. * Understanding of Smart Contracts and consensus techniques, as well as experience developing blockchain apps or proofs-of-concept (POCs) in Solidity on Ethereum. * Hands-on development expertise in the following areas: Solidity, JavaScript, Golang, and JSON. * A strong interest in blockchain technology and like learning and deve...

    $35 / hr (Avg Bid)
    $35 / hr Avg Bid
    71 bids
    ENCRYPTION FOR AN CHAT APP 1 day left
    VERIFIED

    Hey , looking for an encryption expert for a social media app.

    $727 (Avg Bid)
    $727 Avg Bid
    11 bids

    I need to check a bank, where the request is encrypted EAX mode encryption (

    $503 (Avg Bid)
    $503 Avg Bid
    15 bids

    I haveI have an application in JAVA, and I want to convert it to Node.JS Using Crypto. Need to understand AES/CBC , and Diffie-Hellman key

    $171 (Avg Bid)
    Urgent
    $171 Avg Bid
    11 bids

    Want to make a string Encryption and decryption software using Dot net

    $34 (Avg Bid)
    $34 Avg Bid
    14 bids

    I haveI have an application in JAVA, and I want to convert it to Node.JS Using Crypto. Need to understand AES/CBC

    $497 (Avg Bid)
    $497 Avg Bid
    19 bids

    I need help with Encryption calculations and signatures in Python. I will share more details in chat.

    $40 (Avg Bid)
    $40 Avg Bid
    9 bids

    Only Serious people need. Work from home and digital platform like instagram, Facebook, linkedin, etc .

    $2 / hr (Avg Bid)
    $2 / hr Avg Bid
    4 bids

    Looking for a conference paper ( Cryptography/ IoT security/ Network Security/ Federated learning ) ex: 1. A novel Continuous authN in IoT devices , Functional encryption for data privacy etc

    $253 (Avg Bid)
    $253 Avg Bid
    12 bids

    I am looking for a developer to create a simple text messenger on ios that supports end-to-end encryption and send photos. Threema or wikr can be taken as a basis. It is important that the correspondence is as secure as possible. If you have a ready project, we will be happy to buy it

    $57 / hr (Avg Bid)
    $57 / hr Avg Bid
    13 bids

    Looking for asp .net website Main Features Send, receive messages. (auto delete message older than 7 days) Group chat Login Registration pages Control Your Settings. Change Profile information. Web login with email Auth Contacts & block user system Search for a particular message or a user Block a User File Sharing (limit 5 MB) User...Your Settings. Change Profile information. Web login with email Auth Contacts & block user system Search for a particular message or a user Block a User File Sharing (limit 5 MB) User should be able to send msg itself to different devices. Adding a payment gateway for Premium feature—monthly payment or onetime payment. Paid feature should have Encrypted chat system- Chats and file sharing with encryption chat history lifetime. Max file s...

    $233 (Avg Bid)
    $233 Avg Bid
    13 bids

    Hello Guys, Hope you are doing well. I have been looking for Server Engineer and Application Developer to make application for VPN Access. Windows PC VPN Mac VPN iPhone VPN (iOS) Android VPN APK Router VPN Chrome VPN Extension IPsec with encryption, IPsec with Layer 2 Tunneling Protocol (L2TP), SSL 3.0 or Transport Layer Security (TLS) with encryption, Layer Two Forwarding (L2F) or Point-to-Point Tunneling Protocol (PPTP) Warm Regards, Ashwani Dudeja

    $2479 (Avg Bid)
    $2479 Avg Bid
    15 bids

    . A new social platform for singles to meet and mingle. We’r...with the founder and a great opportunity to build out your portfolio. Key features to be built: Geo-location enabled Onboarding verification system (think identity and proof of address) to hold the integrity of the platform Twitter-like User profile feed User profile allowing photos, videos, polls, and reels Ability to “follow” and block others, also “like” posts and stories Ability for ads Encryption-capability Roadmap features: Integration with external systems to purchase entertainment tickets (sports, concerts, etc) Allows user to directly purchase and invite others There’s so much that can be done! If any of this interests you, please reach out to Xak with an attached resume an...

    $34718 (Avg Bid)
    $34718 Avg Bid
    81 bids

    ...is much more open to security assaults in the 21st century than it was in the past. Homomorphic encryption, for example, is used to maintain the security and privacy of data in the cloud since it offers greater dependability than other solutions. Despite the fact that Fully Homomorphic Encryption offers improved privacy and security, there are a number of challenges with key management and storage. Therefore, to overcome this drawback homomorphic encryption can be infused with the PSO (Particle Swarm Optimization) algorithm to achieve effective key management. The main motive of the project is to enhance the key generation, sharing, and management process which is done using Homomorphic encryption with the help of the PSO Algorithm. Moreover, Diffe Helman ca...

    $17 / hr (Avg Bid)
    $17 / hr Avg Bid
    6 bids

    Everyone is familiar with getting license keys to activate software. These keys are normally based on various encryption schemes, and serve to validate that a particular user is authorized to run the software. For this purpose, Please make a Validating Key and Key gen pair. () 1. Input at least three different Local parameters like MAC Id, HDD ID and CPU ID.. (Suggestions Welcome) 2. Take input :: Requesting Person Name, Company name, Email, Software name and Machine Serial Number 3. Create an encrypted (.req) file with all above information 4. On Key -Gen side, Decode all information 5. Generate license for required features(1/16) , as in code project example. 6. Set License type (Demo / Complete) and date of expiry

    $153 (Avg Bid)
    Featured
    $153 Avg Bid
    6 bids

    I need a RSA Encryption software using Tkinter Framework. It should contain options for uploading a text file and able to view and encrypt the text using RSA.

    $164 (Avg Bid)
    $164 Avg Bid
    30 bids

    Role/JD : Data Engineer • 6 years of experience in Designing Azure data lake using data bricks, PySpark, SparkSQL. • Hand on experience on Azure SQL Server, Azure services - Function App, Event Hub, Encryption/Decryption mechanism. • Experience on largest and leading-edge projects, leading cloud transformation and operations initiatives. • Own the technical architecture and direction for a client • Deploy solutions across the Azure platform for major enterprise projects • Producing high quality documentation for consumption of colleagues and development teams • Being a thought leader in introducing DevOps mindset and practices within teams • Helping teams build CI/CD pipelines • Helping development teams solve complex problems in innova...

    $7 / hr (Avg Bid)
    $7 / hr Avg Bid
    6 bids

    Applied Cryptographer / Cryptanalyst * Experience in Matlab , C++, Python * Principle of Symmetric & Asymmetric Cryptography, Hands-on, Technical, Problem Solver. * Can easily crack hash & decrypt strong encryption * Evaluate, Analyse and target weakness in cryptographic security system and algorithms. Investigate, research and test new cryptology theories & applications. Develop and update methods for efficient handling of Cryptic process. * Experience seeing the entire lifecycle of software products is crucial. Strong experience working with engineering and product development teams.

    $327 (Avg Bid)
    $327 Avg Bid
    7 bids

    need write a java application to create german public transportation ticket barcodes. For those a combination of encryption, decryption and signing processes need to be done. We are looking for support with experience with the bouncy castle library.

    $705 (Avg Bid)
    $705 Avg Bid
    18 bids

    ...I need someone to prepare a report on the current market size, share, level of competition and forecast growth in the data software encryption market in Asia, Americas, Europe, Oceania and Africa regions by key segment. There is a lot of information available right now in research reports, but I don’t have time to collect it and analyse it, so I need someone to do the work for me. The Asian and North American markets are of particular interest to us which we need to get right, the other regions are less important but still need to be considered. The reason for the report is simple. We are considering whether to expand an existing data software encryption business into certain regions of the world. If so, how, and in what order? The report findings will feed in...

    $454 (Avg Bid)
    $454 Avg Bid
    34 bids

    we are looking Android Expert for encryption and decryption API integration

    $47 (Avg Bid)
    $47 Avg Bid
    10 bids

    ...-Ensuring that the company's overall strategy and goals are supported by those of the product The Product Security, Product Manager will receive a vision and roadmap with solutions to address the information security needs of our clients. They will help innovate and deliver security features including: -Customer feedback loop -BYO keys -Suspicious login notification -Enabling MFA, 2FA, etc -Encryption at rest Requirements: Define vision and strategy for products and convert them into a workable blueprint for internal and client teams Provide technical leadership for requirements gathering implementation, testing, and delivery Assist product team with sprints from ideation through deployment identifying client needs, designing, and validating concepts, develop...

    $70 / hr (Avg Bid)
    $70 / hr Avg Bid
    16 bids

    Vicetext is a typing plug-in that can help two individuals to make online communications private by encrypting their messages, it is based on blockchain technology (Web 3.0) while allowing people to chat with Web 2.0 software such as WhatsApp, Discord, and Twitter. Visit to see more.

    $8894 (Avg Bid)
    $8894 Avg Bid
    26 bids

    We have a number of clients where our software is hosted on our client's server. The clients own the server as well as the SQL database licenses. They create our SQL access. Our clients makes backups of the databases so have full visibility of our databas...We need guidance and support on how to encrypt the databases so they clients cannot access the databases at all, and the data needs to be encrypted even when they do backups as well so they are not able to restore the services. Secondly we host our application on their servers as well and we need to get the application folders encrypted and secured If you have extensive knowledge on database encryption please apply to this project. Note this is a project on an hour to hour rate based on the number of hours needed Kind ...

    $17 / hr (Avg Bid)
    $17 / hr Avg Bid
    16 bids

    I have already set up openssh, publickey, privatekey, ports etc, but WINSCP is giving the error "connections. Did you want to use FTP protocol instead of SFTP? Prefer using encryption."

    $19 (Avg Bid)
    $19 Avg Bid
    11 bids

    Microsoft implementation of DES, the implementation, the key is automatically generated by the program itself and will be stored in RAM memory during execution of the program code. Your task is to make a copy of the RAM and then analyse that copy, identify and extract the key.

    $31 (Avg Bid)
    $31 Avg Bid
    5 bids

    We need help setting up a deployment pipeline for our web app that is written in react. We use AWS as our cloud provider but would like a solution that is platform agnostic. Therefore the task is to create a docker compose script that can build and deploy the web app on an AWS instance. You will need to set it up using TLS encryption using letsencrypt.

    $520 (Avg Bid)
    $520 Avg Bid
    34 bids

    This goes to anyone who has knowledge in secure software and has experience dealing with RSA public and private keys. You will need to customize the supplied json order file to provide information and then encrypt that json order using aes encryption with the supplied ke and IV then base64 encode the result. However, you may need to convert the message to a byte array from strings to work with the encryption algorithm and generate a message digest using SHA512. I will provide additional files and further instructions upon contacting me. Please also provide your budget first as I am on a strict budget, thank you.

    $18 (Avg Bid)
    $18 Avg Bid
    2 bids

    HI We need web Site VPN Service example of what i want updated You need to create a website VPN SERVICE and an application on andro...every month 7. config types - PPTP, OpvenVPN, L2TP/IPsec, Network Manager 8. It is possible to pause the subscription 9. Types of blocking - OpenVPN ECC - Data channel: AES-256-GCM cipher initialized with 256-bit key; Control channel: TLSv1.3, TLSv1.3 cipher TLS_AES_256_GCM_SHA384, 521 bit EC, curve: secp521r1 - L2TP/IPsec Preshared Key with ESP 3DES encryption and integrity control, 3DES key length is 112 (2*56) bits - PPtP - 128-bit MPPE encryption - Traffic between servers - Data channel: Cipher 'AES-256-GCM' initialized with 256-bit key; Control channel: TLSv1.3, TLSv1.3 cipher TLS_AES_256_GCM_SHA384, 521 bit EC, curve: secp...

    $1232 (Avg Bid)
    $1232 Avg Bid
    32 bids

    I started a new company and I'd like to secure my new email domain. I also built a WordPress website with cybersecurity options enabled. If you think more should be done, let me know and we can increase the scope of the project. I will also install a few Heimdal packages soon to secure the company laptops(Threat Prevention Endpoint, Patch & Asset Management, Ransomware Encryption Protection, PAM, AV, XDR). If you think more should be done, let me know and we can increase the scope of the project.

    $188 (Avg Bid)
    $188 Avg Bid
    36 bids

    Hello, i have an exe custom software which encrypts all files in a folder. But i don't have the encryption method. So i want from someone to find the encryption method and make me a decryption software. I can give to the person who get the project the exe file and the content of some text files.

    $189 (Avg Bid)
    $189 Avg Bid
    17 bids

    You need to make a VPN service website ...Payment service (a wide range of payments including crypto-currencies) with auto-renewal and auto-debit from a bank card every month 7. config types - PPTP, OpvenVPN, L2TP/IPsec, Network Manager 8. Possibility to pause the subscription 9. Encryption types - OpenVPN ECC - Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key; Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 521 bit EC, curve: secp521r1 - L2TP/IPsec Preshared Key with ESP 3DES encryption and integrity control, 3DES key length is 112 (2*56) bits - PPtP - MPPE 128-bit encryption - Traffic between servers - Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key; Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_...

    $1481 (Avg Bid)
    $1481 Avg Bid
    42 bids

    encryption and decryption for network security

    $118 (Avg Bid)
    $118 Avg Bid
    10 bids

    Hello, we're seeking for a computer program expert who is specialized in encrypting project files of Unity&Unreal project, we have a small project that needs encryption service

    $514 (Avg Bid)
    $514 Avg Bid
    28 bids

    It is about security controls in a medium sized scenario. The company has several departments, but we focus on a c...scanner for general use ● WiFi access point for guests in the office ● Router ● Switch Security controls and appliances (can be used in several places) ● Firewalls (provide port numbers to be open for traffic from the outside) ● VPN gateway ● VPN clients ● TLS (provide information between which computers TLS is used) ● Authentication server ● Secure seeded storage of passwords ● Disk encryption ● WPA2 encryption please do the following 1. Create a diagram of your network (using any diagram creation tool such as LucidChart or similar) with all entities 2. Place security controls on the diagram 3. For each security control explain what it is used for and why

    $26 (Avg Bid)
    $26 Avg Bid
    3 bids

    It is about security controls in a medium sized scenario. The company has several departments, but we focus on a c...scanner for general use ● WiFi access point for guests in the office ● Router ● Switch Security controls and appliances (can be used in several places) ● Firewalls (provide port numbers to be open for traffic from the outside) ● VPN gateway ● VPN clients ● TLS (provide information between which computers TLS is used) ● Authentication server ● Secure seeded storage of passwords ● Disk encryption ● WPA2 encryption please do the following 1. Create a diagram of your network (using any diagram creation tool such as LucidChart or similar) with all entities 2. Place security controls on the diagram 3. For each security control explain what it is used for and why

    $42 (Avg Bid)
    $42 Avg Bid
    4 bids

    A paper that describes a ...SplendidCRM running on a server - A Microsoft Exchange Server (For email) - A Windows Server 2012 R2 running Web Server (IIS) Your deliverables are: - An assessment of the current configurations (Pros and Cons) - Potential replacement technologies - Proposed Network Diagram incorporating Cloud and IoT technologies (Do not neglect security measures such as firewalls, IDT, IDS, honeypots, DMZ, or encryption) - A narration explaining your network diagram Your well-written paper should meet the following requirements: - Four to five pages in length, not including the title and reference pages. - Label each section clearly. - Include all external references. - Your paper must follow academic writing standards and APA style guidelines, citing references as ap...

    $65 (Avg Bid)
    $65 Avg Bid
    42 bids

    Key Skills for ANDROID POS LEAD Developer: - Minimum 4 years proven working experience in POS Android app development - Strong knowledge of Android SDK, different versions of Android, and how to deal with different screen size - Strong knowledge of Java, Kotlin, ...Proven software development experience and Android skills development with terminal integration - Proven working experience in Android app development and Experience with various terminal SDKs - Experience with third-party libraries and APIs - Working knowledge of the general mobile landscape, architectures, trends, Terminal, EMV, payments and emerging technologies - Practical knowledge about Encryption, Security Enhancement and its methodologies. - Good verbal and written communication skills(English) - Good problem-solv...

    $2319 (Avg Bid)
    $2319 Avg Bid
    52 bids

    The purpose of project is to let a set of users (known as Administrators) and another set of users (known as Users) share files between each other. Terminology: Folder = Common Space between 1 Administrator and 1 User Salted MD5 Encryption is sufficient for password protection Files should be stored on the disk, but tracked in database. Administrator : User relationships are 1:1, cross-folder permissions are not allowed. To be written in PHP 8 or Node.js. If in PHP 8, then CodeIgniter 4.2.8 version must be used. If in Node.js, Express + Vue.js must be used for the frontend MongoDB or MariaDB/MySQL are preferred User Stories: As an Administrator, I want to be able to (log in) and: (a) Add a new "User" (this should create a "Folder") (b) Delete a "User&quo...

    $1249 (Avg Bid)
    $1249 Avg Bid
    75 bids

    Need "Encrypted Exoticz" designed futuristic style cannabis + encryption

    $76 (Avg Bid)
    $76 Avg Bid
    158 bids

    Top encryption Community Articles