Closed

SSL Handshake

Your task:

Your task is to implement a workflow of SSL hand-shake operations. This includes, but not limited to:

a. Some user-interface to show how each step works.

b. Certificates, in the form of a text file from Certificate Authority (CA) for various parties involved (You do not need to adhere to the PKI standards; you can decide what information should be included in the certificate).

c. Symmetric encryption, and Hashing function (This can be done using an existing library)

d. Public key encryption: include creation of public/private key pairs.

e. The random number generation functions.

f. Demonstrate man-in-the-middle attack and illustrate how the handshake protocol defeats the attacker’s attempts.

Note the following:

1. The software can be written in any computer language you like e.g. Java, Perl, C++, C, bash shell or even be web based (PHP). You can even write part of the software in one language, and others in another.

2. A debug version provides details of what is happening throughout the entire process.

3. Graphical representation is highly desirable. However, no marks will be deducted if you do not use any GUI for visualization of the system. However, the most visually presentable project will be selected, and to be used as demo software for the next year’s Network Security class, in which the names of the group members will be mentioned in class.

4. Your documentation should include a flow chart showing what operations are performed and in the order they are performed in, code samples for each operation. Screenshots of the input and output should also be included in the documentation.

5. You should avoid using existing libraries as much as you can.

Project description – Implementation of the SSL handshake protocol

Skills: C Programming, C++ Programming, Java, Perl, PHP

See more: ssl handshake, java hand shake ssl, shell, names generation, generation web creation, flow in network, c random number library, computer task group, shell bash, bash file, write some software perl, symmetric, pki, java debug, encryption java, d visualization, hashing implementation java, write computer network, hashing text file, security protocol implementation, illustrate man, web order gui, java debug output, bash gui, java user interface demo

About the Employer:
( 0 reviews ) Australia

Project ID: #5076234

12 freelancers are bidding on average $405 for this job

msabouri

Hello there, I can help you with your project. I have experience implementing SSL, and I can deliver the program in C, C++ or Java, as you wish. Please let me know if you are interested so we can discuss more det More

$199 AUD in 5 days
(89 Reviews)
5.9
poornachand

I have 6 years experience in JAVA, J2EE, SSL and ready to work on your application. I can provide you in time.

$222 AUD in 8 days
(38 Reviews)
5.6
sveralex

Hello, here is my bid. Would you accept Delphi, or C++ mandatory ---------------------------------------------------------------------------------

$888 AUD in 20 days
(46 Reviews)
5.5
binwork

I can use part of famous and well known ssl exploit to do it task in .c language. I know crypto on medium level, and can do this task.

$750 AUD in 20 days
(17 Reviews)
4.2
waheni

Good Skilled in nerworking , sniffing let me do this ****************************************************************************************

$1111 AUD in 25 days
(5 Reviews)
4.1
fattahaabdul

i have 8+ years of experience. Can we discuss the project. Please initiate a chat with me so that we can discuss the project at a broader level

$263 AUD in 10 days
(3 Reviews)
3.5
wenjing325

Hi, sir. I'm an experienced C/C++ and network professional. I can do it for you. If you are interested, please send reply. Best regards.

$333 AUD in 10 days
(1 Review)
1.3
suntime0

Hi,I am interested to this work.Please infrom details to start.I can start as soon as possible. Thanks

$155 AUD in 3 days
(1 Review)
1.2
DipanshuBDM

Greetings,Hello Sir, I have gone through your project requirements and we have highly skilled and qualified team who own all the right credentials to execute this job in a very proficient manner as per your exact requi More

$177 AUD in 15 days
(2 Reviews)
0.0
monjued

Hi, Hope you are well. After going through your job description, I am confident that I can accomplish the task to satisfy your requirements. I hold UK University degree in Computing and Information systems, and More

$500 AUD in 3 days
(0 Reviews)
0.0
naveenvishnoi152

Hello , We are a IT Company named is LOGIKAL INFOTEK and we are working with PHP, MAGNETO, JOOMLA, WORD PRESS, ADVANCE JAVA, ASP.NET, MYSQL,And SEO. We also work on the Ecommerce, Portals, and CMS We can develop your p More

$111 AUD in 15 days
(0 Reviews)
0.0
ol41dz

I've a very pedagogical way to implement this protocol work flow. It will be python/tk based. If you need any other details about this just message me. I'm a security engineer, so I know this protocol very well..

$155 AUD in 3 days
(0 Reviews)
0.0