Vigenere cipherJobb

Filter

Mina senaste sökningar
Filtrera:
Budget
till
till
till
Typ
Kompetens
Språk
    Jobbstat
    1,028 vigenere cipher jobb har hittats, med prissättning USD
    Vigenerechiffer Python Avslutades left

    ...kryptera och dekryptera text som endast innehåller stora bokstäver enligt Vigenere-algoritmen. För att göra det behöver du en tabell, som du t.ex. kan generera med följande funktion: def make_cipher(): cipher = [] i = 0 j = 0 # Väljer bokstäverna A-Z for char in [:26]: ([i:26]+[:j]) i += 1 j += 1 return cipher Förutom funktionen make_cipher behöver du igen två funktioner för att kryptera resp. dekryptera ett meddelande. def encrypt(key, msg): cipher = make_cipher() # ...mer kod def decrypt(key, msg): cipher = make_cipher() # ...mer kod Uppgift 2: Testa programmet med exemplet på vigenere-sidan (nyckel "R...

    $15 (Avg Bid)
    $15 Snittbud
    1 bud

    As a tech professional passionate about proper coding practices, I'm in the middle of an application endeavor and I need a helping hand. Specifically, it's a tkinter UI intended for fellow technical professionals, focused on user interface design. Broadly, the application needs: - refactor cu...programming and clean code, well-organized clean architecture are part of the project. Class diagram and use-case diagrams highly appreciated I expect proper separation of concerns and adherence to good coding practices. If you're an experienced Python dev and confident in your tkinter acumen, I'm looking to hear from you. Either for creating the app or guiding me with some help Please add the word: CIPHER to your answer for it to be considered. If you have a portfolio...

    $174 (Avg Bid)
    Brådskande Sekretessavtal
    $174 Snittbud
    9 bud

    I've successfully set up an OpenVPN server using OpenWrt on my Linksys 3200acm router, generating a profile that functions flawlessly on both my mobile device and Windows application. However, when attempting to use another OpenWrt router as a client, I've encountered connectivity issues. Based on my analysis, it appears to be a cipher-related problem. I'm currently seeking the expertise of a freelancer who can address this cipher issue on the client side. The goal is to establish a functional OpenWrt client VPN using the provided profile. If you have the skills to troubleshoot and resolve this matter, please reach out. Your assistance in ensuring a smooth connection between the routers would be greatly appreciated.

    $16 (Avg Bid)
    $16 Snittbud
    4 bud

    I'm in need of proficient cryptographic development assistance. My project revolves around various cryptography techniques, specifically: - Caeser cipher - Hill cipher - Vigenere/Vigenere Tableue - Playfair matrix table I already have a determined key/shift value for the Caeser cipher. However, the need to include both encryption and decryption phases will be contingent on the question I provide. Ideal Skills & Experience: • Expert knowledge and experience with the listed cryptographic techniques • Proven track record with encryption and decryption processes • Ability to adapt to specific project needs and requirements • Excellent problem-solving skills Your job will be to assist in cryptography problem-solving, with t...

    $166 (Avg Bid)
    $166 Snittbud
    3 bud

    I am looking for a skilled freelancer to build a graphical editor for configuring public key cipher schemas. This project involves the RSA and ELGamal algorithms and requires the use of the Sirius framework. Preferred Programming Language: Python Graphical Components: The client will provide a list of components that should be included in the editor. Deadline: The project must be completed within 1-2 weeks. Skills and Experience: - Strong proficiency in Python programming language - Experience with graphical editor development - Familiarity with public key cipher schemas and encryption algorithms (RSA and ELGamal) - Knowledge of Sirius framework for graphical modeling tools - Ability to implement drag and drop functionality for the graphical components

    $109 (Avg Bid)
    $109 Snittbud
    20 bud

    BEFORE APPLYING We will be requesting examples of your work, and a quick voice cal...Cloudsave, bot protection, securing economy) As the client/server are fairly simple I'd expect this piece of work to take 2 days for someone who has done it before, with an additional 1 day for discussions/revisions etc. So allow a total of 3 days for this project. There is further work required as separate projects, based on the outcome of this one. To apply: - Begin your message with the word "cipher" to prove you've read this description - Send an example of previous work where you implemented end to end UGS encryption - this could be a link to a published game, a design document, a process flow or even a text description. We will deep dive into the details on the call with...

    $586 (Avg Bid)
    $586 Snittbud
    35 bud

    ..."unsupported protocol" notices when trying to log on. Requirements: - Expertise in WordPress and website security - Familiarity with SSL protocols and cipher suites - Ability to identify and resolve issues related to unsupported protocols - Experience in updating WordPress websites to ensure compatibility with the latest SSL standards Tasks: - Assess the current version of WordPress being used on the website - Identify the specific areas of the website where the "unsupported protocol" issue is occurring - Determine if an SSL certificate is being used on the website - Update the website, if necessary, to support a common SSL protocol version or cipher suite - Ensure that visitors can log on to the website without encountering any "unsupported pro...

    $18 / hr (Avg Bid)
    $18 / hr Snittbud
    53 bud

    Vänligen Vänligen Registrera dig eller Logga in för att se mer information.

    Framhäv Brådskande Försegla Sekretessavtal

    ...understanding of network protocols, encryption algorithms, and mobile application security to assist with a project. The ideal candidate should have expertise in TCP, HTTP, GRPC, as well as encryption algorithms such as Diffie-Hellman, HMAC-SHA1, and Shannon cipher. The desired outcome of this project is to reverse engineer a private API. Key Requirements: - Proficient understanding of network protocols including TCP, HTTP, and GRPC. - In-depth knowledge of encryption algorithms such as Diffie-Hellman, HMAC-SHA1, and Shannon cipher. - Familiarity with Frida/JS and Java for decompiling APKs and analyzing mobile application security. - Ability to identify and hook into functions within decompiled APKs for script implementation. - Experience in decrypting TCP traffic for f...

    $7263 (Avg Bid)
    $7263 Snittbud
    66 bud

    We need support to resolve some penetration ...alternatives, such as SHA-256, SHA-512, SHA-3, etc. We are able to find these references in the application references but these references are related to Expo packages and can’t be changed. 2-Application uses Cipher Block Chaining (CBC) as it’s encryption mode, along with Public Key Cryptography Standards (PKCS5/PKCS7) padding. This configuration is known to be vulnerable to Padding Oracle attacks. Security Recommendations: Encryption operation mode and the padding scheme should be chosen appropriately to guarantee data confidentiality, integrity and authenticity. We tried to find out these Cipher in the application but unable to find any keywords with “” Hence please dont accept the job unless you kn...

    $162 (Avg Bid)
    $162 Snittbud
    18 bud

    FrontEnd UI/UX Design / Make website visually appealing Main Goal of the website: Challenge website for cipher peer testing Design preferences: No, I am open to suggestions Target audience: Young adults (18-30) Timeline: Need in 5 hours at max Budget: Maximum 30$ Only need HTML and CSS file. Show me sample design and I will choose which looks best, and then you proceed with building it. Skills and experience needed: - Strong UI/UX design skills - Proficiency in front-end development languages such as HTML and CSS - Experience in creating visually appealing websites - Understanding of user behavior and ability to create intuitive user interfaces - Knowledge of responsive design principles - Ability to collaborate with the client to incorporate their vision and suggestions - Attent...

    $35 (Avg Bid)
    $35 Snittbud
    26 bud

    Sn. No. Activity / Task 1 Vulnerable and Outdated Components 2 Lack of Security Headers 3 Email Harvesting 4 No Captcha 5 Domain Access via IP address 6 SSL Certificate with Weak Cipher Suites 7 Website Speed Is Slow 8 Acknowledge Upload Problem In Unit Officer 9 GPF Master Problem In Admin Panel 10 Unit ID Is Still Working After Blocking It 11 A Unit Officer Cant Register On Two Different Units With Same Mobile Number 12 As Mobile No Is Updated SMS Will Be Send To The Mobile No That Your Data Is Updated Create Your User ID 13 Payslip Can Be Downloaded Of Users From Admin Panel 14 Demand Convert Format Template Should Be Changed 15 Images Are Not Showing On Website Home Page 16 E-Book Of Appendix-J Is Not Working 17 In Important Links Principal Controller of Defence Accounts(Bord...

    $292 (Avg Bid)
    $292 Snittbud
    14 bud
    NS3 simulation script Avslutades left

    I am looking for a Freelancer to create an NS3 simulation script for me. The specific network scenario that I would like to simulate is a Wireless S...latency metrics. This project should be completed within the given time frame. If you are experienced in NS3 and can confidently create the simulation script with the necessary parameters, then I look forward to hearing from you. Thank you for your consideration. It should test for TLS 1.3 supported cipher suites which are: TLS_AES_128_GCM_SHA256 TLS_AES_256_GCM_SHA384 TLS_CHACHA20_POLY1305_SHA256 TLS_AES_128_CCM_SHA256 TLS_AES_128_CCM_8_SHA256 Also the characteristics to be tested for each cipher suite are as follows: Encryption Overhead Decryption Overhead Negotiation Time Connection Establishment Time Throughput Handshake...

    $4 / hr (Avg Bid)
    $4 / hr Snittbud
    2 bud
    Black Jack Cipher Avslutades left

    I am looking for a skilled developer who can help me with the Black Jack Cipher project. The desired outcome of this project is to decrypt an existing cipher that is of advanced complexity. Skills and Experience: - Strong understanding of encryption algorithms and ciphers - Experience in decrypting advanced level ciphers - Proficiency in software development and programming languages - Knowledge of cryptography and security protocols Timeline: - The expected timeline for this project is to be determined. If you are confident in your skills and have experience in decrypting advanced level ciphers, please submit your proposal.

    $164 (Avg Bid)
    $164 Snittbud
    22 bud

    Patch mod_ssl-2.8.31-1.3.41 (or apache) to: 1) disable Disable Export Cipher Suites 2) Deploy (Ephemeral) Elliptic-Curve Diffie-Hellman (ECDHE) 3) Use a Strong, Diffie Hellman Group Guide to Deploying Diffie-Hellman for TLS: I have a working Apache 1.3.41 + mod_ssl-2.8.31-1.3.41 + openssl-1.0.1k + php 4.4.9. Openssl was installed like this: Apache 1.3.41 was installed like this: PHP 4.4.9 was installed like this: Downloads: http://67.215

    $570 (Avg Bid)
    Framhäv
    $570 Snittbud
    10 bud
    Try to Hack Me Avslutades left

    Hello, I need 1 hour of support in order to use https://tryhackme.com. For example now i'm getting this errror when I try to conenct from Kali VM: 2023-09-03 02:14:30 Note: --cipher is not set. OpenVPN versions before 2.5 defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers. 2023-09-03 02:14:30 Note: cipher 'AES-256-CBC' in --data-ciphers is not supported by ovpn-dco, disabling data channel offload. 2023-09-03 02:14:30 OpenVPN 2.6.3 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] [DCO] 2023-09-03 02:14:30 library versions: OpenSSL 3.0.9 30 May 2023, LZO 2.1...

    $16 (Avg Bid)
    $16 Snittbud
    4 bud

    ...samples demonstrating their expertise in Matlab encryption projects - The ability to provide detailed project proposals for encryption tasks - The project must be completed in 2-3 days due to shortage of time -I want a project which uses hybrid encryption (AES+ECC) in 3 ways to encrypt and decrypt the text message -The three ways are : 1. In which first the plain text is encrypted using Aes and the cipher text obtained is again encrypted with ECC algorithm. 2. In the second method, the Aes key is divided into 4 parts and one of the part is encrypted by ECC and a new AES key is formed(joining encrypted part with rest of key) and with the help of new key , plain text will be encrypted. 3. In third method , the whole aes key is encrypted by ECC and then encrypted text act as new AeS...

    $51 (Avg Bid)
    $51 Snittbud
    2 bud
    Trophy icon Supplement Label Design Avslutades left

    ...com/document/d/1Dhyx9aj-Z6iLtoXElToEpEahOby26kiILZLteosBTKo/edit?usp=sharing Therefore, we would like to add some hidden stuff inside the red lines, being this the “background” of the label. For example: You can do the borders as in the US dollar bill, and on every corner, have one of the following elements: Ankh cross, astral compass, esoteric hourglass, unfinished pyramid, 13 stars, cryptic cipher and/or the Latin phrase: Annuit Coeptis or Novus Ordo Seclorum. If you have any questions feel free to reach out!...

    $150 (Avg Bid)
    Garanterad
    $150
    98 bidrag

    Implementing tested cmac authentication on a RL78 microcontroller We are looking for a skilled freelancer to assist us in implementing CMAC (Cipher-based Message Authentication Code) authentication on an RL78 microcontroller using RL78's embedded system programming capabilities. The project will involve integrating the necessary cryptographic libraries and functions to perform the CMAC calculations efficiently. Freelancer will need to configure the RL78 microcontroller to support the CMAC implementation. This includes setting up the required memory, registers, and peripherals to handle the cryptographic operations efficiently. Testing and validation of the CMAC implementation will be required to ensure its correctness and reliability.

    $469 (Avg Bid)
    $469 Snittbud
    15 bud

    I am looking for a developer who can create a Smartphone App using Xamarin Visual Studio 2022. The primary function of the app is: Encrypt text using Caesar cipher algorith () Decrypt text using Caesar cipher algorith () Add Google AdMob "banner" to the App Design: Attached is a wireframe of the App I need. Platforms: The app should be developed for both iOS and Android platforms using Xamarin/Visual Studio 2022. Ideal Candidate: The ideal candidate for this project should have experience in developing Smartphone Apps using Xamarin Visual Studio 2022. They should also have a good understanding of mobile app security protocols and be able to implement these into the app. Additionally, the candidate should

    $25 (Avg Bid)
    $25 Snittbud
    2 bud

    Our website is currently down and we have had a hostmonster expert fix it over 3 times and it still is giving the ERROR below. The connection for this site is not uses an unsupported protocol. ERR_SSL_VERSION_OR_CIPHER_MISMATCH Unsupported protocol The client and server don't support a common SSL protocol version or cipher suite. WE need someone to go into our hosting site and fix the issue.

    $123 (Avg Bid)
    $123 Snittbud
    46 bud

    ...interface. Detailed Specifications: 1. Scanning QR code: The application will use an existing open-source library to scan a QR code from a piece of paper. The open-source library available at should be used for this purpose. 2. Decrypting the QR code: The scanned QR code will contain encrypted data. The data will be encrypted using AES-256-CBC cipher and hashed using 'sha3-512'. The encryption is done in PHP. The application should be capable of decrypting this data. You will be provided with the necessary key for decryption. 3. Decompressing the data: After decryption, the data should be decompressed. The data will be compressed using gzcompress function in PHP. 4. Displaying the data: Before displaying the data on the mobile screen, the

    $212 (Avg Bid)
    $212 Snittbud
    36 bud

    Good day, I have designed a static logo which has been approved. I need this logo to be animated for a website so we can load it and let it run on the splash page. I have all the files, fonts and the approved criteria for the animation.

    $105 (Avg Bid)
    $105 Snittbud
    49 bud

    ...See the attached design. This is EXACTLY what I need First image - globe, with Cipher and little block that make a circle: -The animation should be in a file format that can play embedded on a website on a smooth loop. Using the graphics and logo I sent, the logo must have the following animations: -The earth globe must spin slowly from left to right -The circle made up of little cubes must spin and rotate clockwise around the globe. -The binary 1's & 0's must spin within this circle. -It must be scalable on the website page. -It must be lightweight to not cause lagging on the website. -The "network" connections on the globe must pulsate giving the idea that everything is connected. Second image, globe with Cipher with black circle: -The animation...

    $96 (Avg Bid)
    $96 Snittbud
    89 bud
    Block cipher algorithm Avslutades left

    I have an algorithm code that I need to modify or write new code in another way by Block cipher algorithm

    $37 (Avg Bid)
    $37 Snittbud
    6 bud
    Trophy icon I need a cryptographer Avslutades left

    I need help figuring out the encryption technology used. I have the encryption key, just do not know the cipher used. The first person to post the correct answer wins. The encryption key as pulled from the system - 90|243|63|133|230|21|195|125|173|249|168|78|251|9|208|31 The encrypted string - NIrQMMouQp4BSIcRh622fg== The decrypted string starts with a 4 and is all numbers. AND IS 9 DIGITS LONG If there is a winner, the winner will be offered a freelance job. UPDATE --- Here is a new string with results. If you can tell me what decryption/cipher you used to recreate the same results, and I can reproduce the results, you will win. Unecrypted String = 123456789 Encrypted = dpuY83svYbHnw1HVfNVByg== Key = 90|243|63|133|230|21|195|125|173|249|168|78|251|9|208|31 The key is...

    $275 (Avg Bid)
    Garanterad
    $275
    22 bidrag

    Optimization of TradingView Strategy Code using Pine Script I am looking for an experienced freelancer to optimize the sell signals of my strategy code which is built on "Cipher Twister - Long and Short" as seen on TradingView. *(Please find the code attached to the description. When you install it, change the orders to "Market"). Some of the tasks asked are: - Review the indicator settings: Take a closer look at the ChanLength and AvgLength parameters. Adjusting these values may help fine-tune the indicator's sensitivity and improve the accuracy of the sell signals - Delete unnecessary messages in the code - Analyze the exit conditions: Examine the logic and conditions used to determine the exit points for long and short positions. Add...

    $478 (Avg Bid)
    $478 Snittbud
    16 bud

    ...binary data intended for encryption, outFile is the output file where you save all the necessary data for decryption, and publicKeyFile is the public key that will be used to encrypt the symmetric key. The parameter symmetricCipher is the name of the symmetric cipher. The function generates a symmetric (shared) key and an initialization vector (IV), which will be the input to the symmetric cipher symmetricCipher. You will encrypt the data in inFile with this cipher, key, and IV. Also, you encrypt the symmetric key with an asymmetric cipher (RSA) using the public key stored in publicKeyFile. OpenSSL does most of the work for you: PEM_read_PUBKEY reads the public key, EVP_SealInit generates a shared key and IV (if necessary), encrypts the shared key, and set...

    $37 (Avg Bid)
    $37 Snittbud
    5 bud

    I have .net web application and i have installed SSL certificate and it's showing website uses an unsupported protocol. ERR SSL OR CIPHER MISMATCH

    $82 (Avg Bid)
    $82 Snittbud
    4 bud

    Guidelines are attached……………….

    $70 (Avg Bid)
    $70 Snittbud
    8 bud

    develop a software program that allows them to generate keys and encrypt and decrypt their files using Java, You should the users with two options: 1. Symmetric cipher using AES with the following capabilities: a. Key generation. b. File encryption. c. File decryption. 2. Asymmetric cipher using RSA with the following capabilities: a. Key generation b. File encryption c. File decryption make the program easy to use

    $115 (Avg Bid)
    Brådskande
    $115 Snittbud
    3 bud

    read a color image then apply fruit fly optimizations' on it to get best location x and y then we have a text we should cipher it via 4D Hyperchaotic System will be as watermark and hide it in best locations after that the original image and watermarked image should be same there is not any modifying finally extract the text from image to identify verification

    $600 (Avg Bid)
    $600 Snittbud
    6 bud

    read a color image then apply fruit fly optimizations' on it to get best location x and y then we have a text we should cipher it via 4D Hyperchaotic System will be as watermark and hide it in best locations after that the original image and watermarked image should be same there is not any modifying finally extract the text from image to identify verification

    $564 (Avg Bid)
    $564 Snittbud
    7 bud

    can u please implement this serial bit architecture in parallel so that the no. of rounds could get decreased and can run simulation synthesis and implementation in vivado and we will get power output

    $120 (Avg Bid)
    $120 Snittbud
    1 bud

    Market Cipher B , Market Cipher SR

    $195 (Avg Bid)
    $195 Snittbud
    2 bud

    At the point I circled in red, it is above 60 in 4 different time periods. I want it to scan the coins that meet these conditions and notify me. Or vice versa, when it is below -60 in 4 different time periods. It takes time to look at different times and find the coins above 60 or below -60. The only indicator is that I want it to notify me of the coins that meet these conditions.I want to set time zones

    $191 (Avg Bid)
    $191 Snittbud
    7 bud

    I want a scanning feature for this indicator. I want it to notify me if it is above or below a certain level, such as 30 min 1h 4h 1d for different time intervals at the same time. For example, I want it to scan and display the coins in binance. If there is something you do not understand, you can write again. tradingview

    $141 (Avg Bid)
    $141 Snittbud
    7 bud

    Simplify a popular pinescript indicator. The indicator is fairly long (500 lines) and certain parts enable multi time frame (MTF) which are referenced in the code with the variable tf or _tf. I want all references, inputs, and options for multi time frame (MTF) removed so it only uses the current chart timeframe. The indicator is Market Cipher B w/ Divergences by VuManChu. I have updated it to V5 and will upload the file.

    $160 (Avg Bid)
    $160 Snittbud
    9 bud

    Hello. I need help with Caeser Cipher & Deciphering by creating an encoder and using C++ (Project source code) & with report - Abstract, Introduction, description of implementation .

    $17 / hr (Avg Bid)
    $17 / hr Snittbud
    14 bud

    Hello. I need help with Caeser Cipher & Deciphering by creating an encoder and using C++ (Project source code) & with report - Abstract, Introduction, description of implementation .

    $48 (Avg Bid)
    $48 Snittbud
    12 bud
    VPN Service Avslutades left

    HI We need web Site VPN Service example of what i want updated You need to create a website VPN SERVICE and an app...from a bank card every month 7. config types - PPTP, OpvenVPN, L2TP/IPsec, Network Manager 8. It is possible to pause the subscription 9. Types of blocking - OpenVPN ECC - Data channel: AES-256-GCM cipher initialized with 256-bit key; Control channel: TLSv1.3, TLSv1.3 cipher TLS_AES_256_GCM_SHA384, 521 bit EC, curve: secp521r1 - L2TP/IPsec Preshared Key with ESP 3DES encryption and integrity control, 3DES key length is 112 (2*56) bits - PPtP - 128-bit MPPE encryption - Traffic between servers - Data channel: Cipher 'AES-256-GCM' initialized with 256-bit key; Control channel: TLSv1.3, TLSv1.3 cipher TLS_AES_256_GCM_SHA384, 521 bit E...

    $1232 (Avg Bid)
    $1232 Snittbud
    32 bud
    Site VPN Service Avslutades left

    You need to make a VPN service website for a PC with a payment system for and other more detailed technical specifications attached,...auto-debit from a bank card every month 7. config types - PPTP, OpvenVPN, L2TP/IPsec, Network Manager 8. Possibility to pause the subscription 9. Encryption types - OpenVPN ECC - Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key; Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 521 bit EC, curve: secp521r1 - L2TP/IPsec Preshared Key with ESP 3DES encryption and integrity control, 3DES key length is 112 (2*56) bits - PPtP - MPPE 128-bit encryption - Traffic between servers - Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key; Control Channel: TLSv1.3, cipher TLSv1.3 T...

    $1524 (Avg Bid)
    $1524 Snittbud
    40 bud

    When she gave you your secret key, Alice told you that she will use use AES-128-bit in cipher block chaining mode (CBC). Alice encodes strings as ‘utf-8’ and uses PKCS padding to allow messages whose size is not dividable by the block size. note: usually libraries handle the padding implicitly. Start your conversation with Alice, receiving her first encrypted message. Use the artificial TA to get convincing arguments to rely to Alice. You may need to exchange more than one message with her. You will know she is convinced when she sends you a unique “I’m convinced” message that has a token. Submit this token and your code to our grading system to pass this task.

    $19 - $22
    $19 - $22
    0 bud

    We require Azure Cloud Security Expert who understands Data classification, Data Loss, Data Encryption, CIPHER TRUST knowledge is Must.

    $31 / hr (Avg Bid)
    $31 / hr Snittbud
    10 bud
    cryptography -- 4 Avslutades left

    I have one cryptography project and there are 3 tasks: task 1 is block modes protect against cipher linearity task 2 is Message authentication codes task 3 is Using block ciphers for hash functions I think it may need one day to complete all. I can share you more details if you are interested. Then plz take a look and see if you can do it with canadian dollar 80 within one day.

    $7 / hr (Avg Bid)
    $7 / hr Snittbud
    1 bud
    cryptography -- 3 Avslutades left

    I have one cryptography project and there are 3 tasks: task 1 is block modes protect against cipher linearity task 2 is Message authentication codes task 3 is Using block ciphers for hash functions I think it may need one day to complete all. I can share you more details if you are interested. Then plz take a look and see if you can do it with canadian dollar 80 within one day.

    $7 (Avg Bid)
    $7 Snittbud
    1 bud
    PKI & Python -- 2 Avslutades left

    *Code in Python (using the package ‘cryptography‘) a certificate generator X509 with RSA keys - We can choose the signature algorithm and the cipher algorithm * Create your root certificate authority (RCA) * Create your Registration Authority (RA) * Sign the certificates generated by your RA * Parse some certificates you have generated and verify its cryptographic validity (and its validity period).

    $94 (Avg Bid)
    $94 Snittbud
    7 bud

    Hi Harish Kumar,I noticed your profile and would like to offer you my project. The requirement for my project is to build a Cryptoprocessor using RISC -V Architecture on Vivaldo. We would be running a lightweight Cipher used in EV control unit (EV-ECU) . Aim is to carry out additional customization of instruction of Chiper, inject errors and collect data. Thereafter analyse the data obtained using AI-ML and be able to predict the type of error. The first stage is to Create the Cryptoprocessor on Vivaldo. I have found a research topic that guides on the same. . Need your guidance and help in this regard. We can discuss any details over chat.

    $14 / hr (Avg Bid)
    $14 / hr Snittbud
    1 bud

    Hi ePlatinum, I noticed your profile and would like to offer you my project. The requirement for my project is to build a Cryptoprocessor using RISC -V Architecture on Vivaldo. We would be running a lightweight Cipher used in EV control unit (EV-ECU) . Aim is to carry out additional customization of instruction of Chiper, inject errors and collect data. Thereafter analyse the data obtained using AI-ML and be able to predict the type of error. The first stage is to Create the Cryptoprocessor on Vivaldo. I have found a research topic that guides on the same. . Need your guidance and help in this regard. We can discuss any details over chat.

    $122 / hr (Avg Bid)
    $122 / hr Snittbud
    1 bud