Aes 256 cbc pkcs7padding jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,000 aes 256 cbc pkcs7padding jobs found, pricing in INR

    I'm seeking expert to assist in configuring a Site-to-Site VPN on my Zyxel USG Flex 50, ensuring secure and reliable communication between our networks. Key Tasks: - connect to a already existing site - configure usg flex to not use dhcp and other option. just need vpn. i have a box behind Ideal Skills and Experience: - Proficient with Zyxel USG series - experience in VPN connection

    ₹12584 (Avg Bid)
    ₹12584 Avg Bid
    9 bids

    Hey you! Do you have more than 6 years as a Laravel Developer? Can you prove it? Can you prove/provide evidence of what you have personally done as a developer? Does compliance to high security standards, encyption at rest, encryption in transit, AES 256, SHA 256 mean something to you? Are you willing to join an existing project? Are you willing to work for a flat monthly salary? Then this job may be for you. Our team is hard at work building a web application. We currently need an additional developer to assist with some key activities. You will be assigned duties by our Application Team Leader. Shoot us a quick message if interested. No agencies or middle men please.

    ₹583 / hr (Avg Bid)
    ₹583 / hr Avg Bid
    81 bids

    ...primary task is to implement encryption and decryption, along with compression and decompression, in the existing project. - Data: The encryption and decryption will primarily focus on text data. - Implementation: I specifically require the use of AES, Huffman, Inflate and Deflate, and GZIP mechanisms for the encryption and decryption process. Ideal Skills and Experience: - Extensive Experience: Strong experience with VB6, particularly in encryption, decryption, compression, and decompression. - Specific Knowledge: Proficiency in implementing AES, Huffman, Inflate and Deflate, and GZIP in VB6. - Industry Best Practices: Knowledge of encryption best practices and data protection standards. If you have expertise in VB6 and encryption/compression techniques, your bid will b...

    ₹4584 (Avg Bid)
    ₹4584 Avg Bid
    10 bids

    Project: Configuration of the eCash node and mining pool The Pool will only be...(LocalHost). 2. Installation and configuration of ckpool mining software on the same server. 3. Configuring ASICs to connect and mine through the pool. 4. Ensure continuous connectivity and proper functioning of the eCash node and mining pool. 5. Troubleshooting issues related to network connectivity and hardware configuration. Requirements: - Proven experience with cryptocurrency mining, especially SHA-256. - Knowledge in installing and configuring cryptocurrency nodes and mining pools. - Ability to troubleshoot network connectivity and hardware configuration issues. - Familiarity with eCash (XEC) is an advantage. Submit proposals with details about your experience, including examples of similar past...

    ₹98925 (Avg Bid)
    Urgent
    ₹98925 Avg Bid
    6 bids

    ... I would like to have an efficient algorithm implemented that is capable of converting existing hashing power to mine using the SHA-256 algorithm. This would allow me to increase the diversity of my mining operations. Key requirements for this project include: - Developing an algorithm that can convert hashing power automatically - Primary focus on SHA-256 algorithm - Emphasis on compatibility across different systems rather than speed or energy efficiency Ideal candidates for this project will have a strong background in algorithm development, specifically relating to cryptocurrency mining. Familiarity with different mining algorithms, particularly SHA-256, is absolutely essential. Lastly, having prior experience in developing high compatibility algorithms will g...

    ₹49837 (Avg Bid)
    ₹49837 Avg Bid
    25 bids

    I'm looking for someone who has experience in AES encryption and is also familiar with ASP.Net MVC database connection string, I need a person who can encrypt my connection string and show me the right way to complete the function.

    ₹667 / hr (Avg Bid)
    ₹667 / hr Avg Bid
    22 bids

    ...background in machine learning and healthcare. The objective of this project is to analyze public health data and identify discrepancies in the patient's health records. Key project details: - We will be using public health datasets as our primary source of data. - The main focus of the project would be to identify discrepancies within the patient's health records, especially issues related to CBC reports like low RBC or WBC counts. - Create a webapp interface with ML functioning integrated. The ideal candidate should: - Have a proven record of working on machine learning projects with a healthcare application. - Be proficient in data analysis, specifically in working with public health datasets. - Demonstrate experience in identifying discrepancies in medical data. ...

    ₹3500 (Avg Bid)
    ₹3500 Avg Bid
    14 bids

    ...WiFi router. It can maybe use a technology similar to Z Wave or Zigbee wireless technology, and maybe use a method like PairAsync for pairing or connecting. The app must have a high level of security using HTTP, SSL, TLS or similar, and must encrypt and decrypt all data during transit and at rest with advanced security features like LESC, and using systems such as, or similar to, FIPS 140-2 and AES-SHA256 cryptography. I would like to have copies of any written source code that is created by you or any details on the tech stack, SDK and APIs used. As the app could be using Bluetooth or BLE, I want users to be able to send and receive data without the requirement of having to prompt for, or give permission for, a “pairing” or “connecting” of devices each ti...

    ₹74340 (Avg Bid)
    ₹74340 Avg Bid
    50 bids

    I'm in need of a C# program that can hash files as quickly as PowerShell does. The program should be able to hash image files and all other types of files at the same speed, while utilizing the SHA-256 hashing algorithm. Additionally, it would need to read and write data efficiently. Key requirements: - Develop a C# program to hash files. - Implement the SHA-256 hashing algorithm. - Ensure the program reads and writes data smoothly.

    ₹2084 (Avg Bid)
    ₹2084 Avg Bid
    2 bids

    I need a C# program that hashes text strings using SHA-256 hashing algorithm. The current program I have was designed to hash data, but I've noticed it does so in a different order than PowerShell. This is problematic for my workflow, as I need the two to hash data in the same order for consistency. Key Requirements: - Make the C# program hash data in the same order as PowerShell using SHA-256 - Ensure the program is efficient and secure - Document the changes made for future reference Ideal Skills: - Proficient in C# programming - Expertise in working with hashing algorithms, especially SHA-256 - Prior experience with data consistency issues - Strong understanding of security protocols and best practices Please include your relevant experience and approach in...

    ₹3834 (Avg Bid)
    ₹3834 Avg Bid
    18 bids

    I require a specialist to build a solution that validates the authenticity of hashed data in video format. The key focus of this project demands: - Experience in hashing algorithms, notably SHA-256 - Proficiency in data authenticity verification - Familiarity with video formats, particularly MP4 - An understanding of how to match video-recorded audit logs with original hashed data It's crucial to know if the hash data from the video recording matches the original hash of the audit logs for data authenticity purposes. Please note that the audit logs are text-based and believed to contain a hash of the original file. Your role is to confirm this authenticity. This task requires a comprehensive understanding of data security and integrity checks. If you have prior experience i...

    ₹7584 (Avg Bid)
    ₹7584 Avg Bid
    13 bids

    ...MEP (Mechanical, Electrical, and Plumbing) design to ensure that they fulfil the requirements of the Canadian Building Code (CBC). This endeavor specifically involves a residential building. Key requirements: - Redefine Electrical Systems: Help in reworking the electrical systems design with meticulous attention to the ideas in the feedback. - Adjust Mechanical Systems: Assistance in harmonizing the comments into my mechanical systems design is needed. - Enhance Plumbing Systems: Need your expert input in enhancing my plumbing systems design as per the received remarks. Ideal skills and experience: - Detailed knowledge of, and practical experience with, the CBC - Proven experience in MEP design for residential buildings - Proficient in the latest design software - A...

    ₹13168 (Avg Bid)
    ₹13168 Avg Bid
    12 bids

    I am in need of a professional capable of making corrections to my...capable of making corrections to my existing MEP design in accordance to the Canadian Building Code. Modifications are required in the following areas: - Electrical - Plumbing - HVAC Unfortunately, there have been some issues identified in these areas that need to be fixed. Although specifics on the issues haven't been stated, having expertise evaluating and correcting such systems to comply with the CBC is critical. Ideal candidate will possess: - A strong knowledge in Electrical, Plumbing, HVAC systems - Experience working with the Canadian Building Code - A keen eye for identifying and correcting potential MEP design issues. Please submit your proposal detailing your relevant experience and your approach t...

    ₹1333 (Avg Bid)
    ₹1333 Avg Bid
    3 bids
    Trophy icon Humorous T-shirt Design Ended

    I'm seeking a skilled graphic designer to create a funny, brightly colored T-shirt design that features humans. The aim is to create an engaging, humorous design that is sure to catch the attention. Key Requirements: - Excellent skills and experience in gra...particularly with T-shirt design. - Ability to create eye-catching, humorous designs. - Proficiency in handling bright colors and human figures in design. - Good sense of humor to incorporate wit in the design. The ideal candidate will have a keen eye for detail and ability to translate ideas into creative graphics. It needs to have my company name and phone number, Custom Pro Services llc 256-399-7140. I want it to say something like, i got plastered by Custom Pro Services. We are a swimming pool plastering and ...

    ₹8417 (Avg Bid)
    Guaranteed
    ₹8417
    141 entries

    ...and Social Security Numbers. - File Saving: After the blurring process, I don't want to affect original data. Therefore, the solution must create a separate PDF that hosts the redacted information. - Encryption: For even further data protection, the blurred PDF file has to be encrypted using the AES (Advanced Encryption Standard) method, ensuring optimal security. To be considered for this task, you should have: - Proven experience with data redaction or similar projects - Robust knowledge of AES encryption - A strong background in software development, specifically for privacy and security applications. The ultimate goal is to generate a tool that is user-friendly and efficient, delivering maximum data protection. An ideal freelancer for this job is rigorous, fam...

    ₹2917 (Avg Bid)
    ₹2917 Avg Bid
    13 bids

    I'm looking for a professional translator to convert an English written content to Italian. The timeline for this project is extremely tight and I need a freelancer who can deliver quality results promptly. Key Requirements: - Translate English content into Italian: You must have excellent command of both languages with experience in content translation. - Experience with Pagination: The conten...Skills and Experience: - Proven experience in English to Italian translation, specifically in the context of pagination. - Ability to work under tight deadlines without compromising on quality. - Strong communication skills to provide regular updates on the progress of the project. Please provide a portfolio of your previous translation work and any relevant experience with pagination. P...

    ₹31031 (Avg Bid)
    ₹31031 Avg Bid
    64 bids

    I’m in need of an intermediate-level C++ coder for a bitcoin mining initiative. The successful applicant must be comfortable with coding for solo mining. This project doesn't require expertise in multi-threading or pool mining, but a firm grasp on the creation and development of bitcoin mining algorithms is essential. An understanding of SHA-256 algorithm implementation is a plus, though not mandatory. Looking forward to your bids, and to our potential collaboration.

    ₹10834 (Avg Bid)
    ₹10834 Avg Bid
    18 bids

    Develop an app which resides and runs of a usb thumb drive. The app needs to launch automatically when the usb is inserted into the Windows computer. App should give a selection of Backup or Restore to the user...an OPTIONAL add on quote if encryption is required. More details on Encryption below: OPTIONAL QUOTE: Encryption has to be on the entire thumb drive level. As soon as thumb drive is inserted the first time, it has to ask user whether encryption is needed, if yes, it has to ask user to setup a strong key/password and encrypt the disk according to any standard FIPS approved encryption standards (AES preferred). Whenever the thumb drive is used subsequently, it has to prompt user to enter the password to unlock the drive and the app before continuing with backup/restor...

    ₹64505 (Avg Bid)
    ₹64505 Avg Bid
    13 bids

    ...developing encryption, decryption, and key generation functionalities. Key Project Requirements: - Extensive knowledge and application of Cryptography - Proficiency in the C programming language - Experience in generating SHA keys The Cryptographer will perform the following tasks: 1. Encryption and Decryption: You will write code that facilitates both encryption and decryption processes using the AES (Advanced Encryption Standard) algorithm. 2. Key Generation: Involves the creation of a safe and secure key generation mechanism utilizing SHA. You should prioritize key security to guarantee the confidentiality and integrity of the encrypted contents. 3. File Support: The coded software should accept file inputs only, handling and processing encryption and decryption request...

    ₹1417 (Avg Bid)
    ₹1417 Avg Bid
    3 bids

    ...both a 3D and flat icon for brand consistency. I need an icon to use in some cases since my logo is so big. The requirements include: - Creating a 3D icon version utilizing the original logo colors - Designing a flat icon version using the same color scheme - Delivering the final icons in PNG, AI, SVG, and JPG formats Here's an example of the flat icon - Here's the 3D icon - Here's my actual logo files - The ideal freelancer for this

    ₹6417 (Avg Bid)
    ₹6417 Avg Bid
    171 bids

    I need a modern architectural design for a house with a plot size of 32x72, covering 256 square yards. The ground floor should include a double-height living area, three bedrooms, a kitchen, dining area, and a drawing room. The first floor should feature three additional bedrooms. The project should envelop both interior and exterior designs, along with 3D visualizations. Specifications: - Style: Modern Architecture - Theme: Modern Interior - Color Palette: Latest Trending Styles Ideal skills and experience for the job: - Bidders should have proficiency in modern architecture and interior design - Experience in creative space utilization in residential layouts - Expertise in 3D visualization of plans and designs - Awareness of latest color trends in interior design This is a fa...

    ₹11803 (Avg Bid)
    ₹11803 Avg Bid
    45 bids

    As an expert in Google Cloud services and security configurations, you'll be tasked to: - Set up a Load Balancer on Google Cloud Engine for a Google App Engine project in a two-hour live session via Google Meet with screen sha...up a Load Balancer on Google Cloud Engine for a Google App Engine project in a two-hour live session via Google Meet with screen sharing. - The main goal is to increase the security of the site. - You're expected to disable TLS 1.0 and 1.1 protocols, and enable both TLS 1.2 and TLS 1.3 versions in the project for optimal security. - Also, certain encryption algorithms, specifically RSA, AES 128, AES 256, CBC and GCM need to be disabled. The ideal candidate must have extensive experience with GCE and advanced understanding of...

    ₹4417 (Avg Bid)
    ₹4417 Avg Bid
    4 bids

    I am developing a secret key encryption system on Ubuntu. The primary goal is to safeguard sensitive data and enable secure communication. The encryption mechanism should provide a standard level of protection, not too basic yet not overly complex. The system will undergo frequency analysis against monoalphabeti...cipher, which requires a certain level of encryption strength to be effective. Key Requirements: - Implementation of a secret key encryption system on Ubuntu - Encryption strength must be set at medium level - Must be able to prevent unauthorized access through frequency analysis against monoalphabetic substitution cipher. -encryption using different cipher and modes -encryption mode - ecb vs cbc -padding, initial vector and error propagation -programming using the cryp...

    ₹2250 (Avg Bid)
    ₹2250 Avg Bid
    4 bids

    More details: What is the primary reason for encrypting the Raspberry Pi 4 OS and inside files? Protect sensitive data What encryption level do you require for your sensitive data? 256-bit encryption Are there specific files or data types that need to be prioritized in the encryption process? Program and System Files

    ₹13001 (Avg Bid)
    ₹13001 Avg Bid
    8 bids

    I need a custom code component created for my PowerApps Canvas App. Key Requirements: - The component should decrypt static text encrypted with AES or any other simple algorithm Deadline: - I need this project completed ASAP. Ideal Skills and Experience for the Job: - Strong experience with C# programming, Java script or any language that we will use to achieve the goal - Prior experience with creating code components for PowerApps Canvas Apps. - Proficiency in encryption/decryption methods

    ₹13668 (Avg Bid)
    ₹13668 Avg Bid
    39 bids

    I'm seeking an ethical hacker to help me enhance the security of my website. Key Requirements: - Identify vulnerabilities in the current system - Encrypt the website's hash data effectively using a secure algorithm - Provide ongoing support...my website. Key Requirements: - Identify vulnerabilities in the current system - Encrypt the website's hash data effectively using a secure algorithm - Provide ongoing support to ensure the system remains secure Ideal Skills: - Proficiency in ethical hacking - Experience with encryption algorithms (knowledge of AES, RSA, Blowfish is a plus) - Strong problem-solving and analytical skills - Excellent communication and collaboration abilities Please note, the key size for the AES encryption algorithm will need to be det...

    ₹29552 (Avg Bid)
    ₹29552 Avg Bid
    13 bids

    ...Bitcoin Libraries for Transaction Validation: You must not use any Bitcoin-specific libraries or frameworks that automate transaction validation processes. The intent of this task is for you to implement the validation logic manually. - Permissible Libraries: The use of standard cryptographic libraries, such as secp256k1 for elliptic curve cryptography, and standard hashing libraries (e.g., for SHA-256) is allowed and encouraged. These libraries are essential for implementing the cryptographic underpinnings of bitcoin without reinventing the wheel. - Implement the Mining Algorithm Yourself: You are required to implement the mining algorithm on your own. This includes creating a way to correctly form a block header, calculate the hash, and meet the task of finding a hash below a c...

    ₹917 (Avg Bid)
    ₹917 Avg Bid
    3 bids

    I'm seeking an expert who can decrypt an AES encrypted .cap file. The file contains encrypted data I need to access for educational purposes. Key requirements include: - Expertise in decrypting AES encrypted files - Ability to efficiently and securely recover the data from the .cap file - Strong commitment to data privacy and confidentiality Please provide examples of similar work you have done in the past, and outline your proposed approach to this task.

    ₹1500 / hr (Avg Bid)
    ₹1500 / hr Avg Bid
    15 bids

    I need someone to calculate and show me simply the difference between different computer systems: 1) standard 32 bit computer 2) standard 64 bit computer 3) 32 qubit quantum computer 4) standard 256 bit super computer 5) standard 1024 bit super computer 6) a hypothetical system that uses hex instead of bits I will give 2 simple calculations and i simply need to understand how many combinations ie how long it would take to perform simple calculations for each of the 6 systems. Will lead to more work

    ₹8001 (Avg Bid)
    ₹8001 Avg Bid
    30 bids

    ...to the encrypted files. 5. Ensure that your decryption process accurately recovers the original file, including its correct extension. The decrypted file should be identical to the original input file in every aspect. Topics for Approach 1: Implementation of one of the below algorithms Implementation of DES (Data Encryption Standard) AES (Advanced Encryption Standard) Camellia Blowfish Twofish RC4 (Rivest Cipher 4) Serpent CAST-128/CAST-256 Project Guidelines: 1. Proposal Submission: o ● Submit a proposal outlining the chosen approach and topic. o ● Include a brief description of the methodology for Approach 1 or the selected 2. Research Phase: o ● Approach 1: Conduct research on the chosen encryption algorithm, understanding its principles and funct...

    ₹9751 (Avg Bid)
    ₹9751 Avg Bid
    43 bids

    I am currently seeking an experienced AES cyber security professional. Project Summary: - Implementation of Encryption Algorithm: a) Develop an implementation scenario for one encryption algorithm. b) Provide a detailed description of the chosen algorithm, including its functioning. c) Apply software engineering approaches, starting from requirements gathering to design and implementation phases. d) Submit a complete project package containing: • The implemented encryption algorithm. • Detailed documentation of the algorithm and project development process. • A graphical interface for file encryption and decryption. • Important Implementation Tips: In your implementation, please adhere to the following guidelines: 1. Your program should accept any file type as ...

    ₹11001 (Avg Bid)
    ₹11001 Avg Bid
    49 bids

    I'm seeking an expert in Python to develop a decryption utility tool. The purpose of this tool is to decode encrypted messages, binary files, and encoded data, helping me simplify and expedite data analysis tasks. The ideal candidate will: • Have substantial experience with Python programming. • Be familiar with various encryption algorithms, notably AES, RSA and DES. Your expertise in these will be key to the successful creation of this utility. • Be committed and focused, as the tool must be completed ASAP. Looking forward to receiving bids from suitable and interested freelancers. Please, when bidding, include any relevant experience and examples of similar projects.

    ₹1750 (Avg Bid)
    ₹1750 Avg Bid
    76 bids

    ...users on HIPAA regulations and compliance requirements and ensure ongoing compliance through regular audits and monitoring. Technologies: - Frontend: HTML5, CSS3, JavaScript (React.js for web, React Native for mobile) - Backend: Node.js, , MongoDB (or other suitable database) - Authentication: JWT (JSON Web Tokens) with secure storage and handling of authentication tokens - Encryption: AES encryption for data at rest and TLS encryption for data in transit - Audit Trails: Implement logging mechanisms to capture user activities and system events for audit purposes - Compliance Tools: Utilize HIPAA compliance management tools for risk assessment, policy management, and compliance monitoring Deliverables: - Fully functional web-based LMS accessible via web browsers and a mobile app...

    ₹1286191 (Avg Bid)
    Urgent
    ₹1286191 Avg Bid
    143 bids

    I'm currently using PERL 5.10 system and requires a proficient expert to aid in modifying how passwords are hashed in my system. Initially, we employed SHA-256 but we're looking to switch to PBKDF2. Ideal Skills and Experience: - Proficient in PERL 5.10 - Familiarity with SHA-256 and PBKDF2 hashing methods - Prior experience in password re-hashing Task Objectives: - Identify current SHA-256 hashing method in the system - Modify hashing method to use PBKDF2 instead - Validate successful implementation of the PBKDF2 hashing method The project necessitates a strict focus on security and confidentiality given its sensitive nature.

    ₹1083 (Avg Bid)
    ₹1083 Avg Bid
    26 bids

    ...Transaction Validation: You must not use any Bitcoin-specific libraries or frameworks that automate transaction validation processes. The intent of this challenge is for you to understand and implement the validation logic manually. Permissible Libraries: The use of standard cryptographic libraries, such as secp256k1 for elliptic curve cryptography, and standard hashing libraries (e.g., for SHA-256) is allowed and encouraged. These libraries are essential for implementing the cryptographic underpinnings of bitcoin without reinventing the wheel. Implement the Mining Algorithm Yourself: You are required to implement the mining algorithm on your own. This includes creating a way to correctly form a block header, calculate the hash, and meet the challenge of finding a hash below a ce...

    ₹1083 / hr (Avg Bid)
    ₹1083 / hr Avg Bid
    7 bids

    I have 3 sheet in Google sheet 1 customer 2 product 3 Order Then I make three table in Appsheet I want if I select any product have same Name include in product table should Add in order table example : if I select CBC then add all product which have in CBC catagory

    ₹833 (Avg Bid)
    ₹833 Avg Bid
    12 bids

    For this task, I require a skilled developer with solid background in Docker and Kafka. The task at hand is to work on an existing Docker Compose script for a Kafka application centered around authorization. Key Requirements: - Incorporating SASL/SCRAM authentication mechanism. - Focusing on the SCRAM-SHA-256 version for Kafka authentication. A deep understanding of the listed technologies and profound experience in adding security features to Kafka applications will be a significant advantage. Secure, reliable streaming is the goal. Therefore, the freelancer needs to be knowledgeable about how SASL/SCRAM authentication enhances Kafka application's security. Only bid if you are highly confident you can deliver my exact requirement.

    ₹2250 (Avg Bid)
    ₹2250 Avg Bid
    4 bids

    ...pace of development. Key requirements include: - Proficient in the use of NTAG 424 DNA for mutual authentication -' SUN, AES,CMAC, dynamic authentication, mutual authentication' How they work. - Proficient in making native app on NFCs. - Familiar with programming and product authentication methods - Comprehensive knowledge in front-end, backend and database so, in short, i want to make a cross-platform anti-counterfeiting app using NFC (ntag424 dna) . which the user is going to scan the tag with the app it's going to verify it with the database. then show them the UI as per you familiar with these kinds of platforms and the ntag 424 DNA (SUN, AES,CMAC)? i will welcome any suggestion or recommendation from your side too. Better ideas are also welcome...

    ₹36920 (Avg Bid)
    ₹36920 Avg Bid
    5 bids

    Hello i need to creare a script on nodeJS for create a wallet eth , the screept need to work on autoincrement and need to have a range page , the script on parameter need to have page start and page stop for generate , every page need to have 128 / 256 result the user need to choise , the result need to be stored on sql server text me for more info

    ₹2167 (Avg Bid)
    ₹2167 Avg Bid
    10 bids

    ...is an author and speaker with strong focus on China. Therefore, red should be the main color. See my substack here: Needs: - Logo for a Homepage (together with set of fonts to use in the homepage) - Logo for Business Cards (together with set of fonts to use on the business card) - Youtube: for channel and watermark Substack: - minimum 256×256 Pixel (square logo) - brand name: minimum 1344×256 aspect ratio: 21:4 - title picture: minimum: 600x600px square LinkedIn: - Round profile picture - rectangle profile background...

    ₹7667 (Avg Bid)
    ₹7667 Avg Bid
    91 bids

    ...an expert to implement advanced AES-256 bit security encryption for an SQLite database in a Windows application using VB.Net. This task requires specific expertise in working with encryption to secure private data. Key Requirements: - Proficiency in VB.Net - Deep understanding of AES-256 bit encryption - Familiarity with SQLite databases - Prior experience in data encryption The encrypted SQLite database will become a storage unit for personal identifiable information. This sensitive data demands high security measures, thus professional handling is crucial for the success of this project. The completed task should ensure maximum protection against unauthorized access and reliably shield the stored personal data. Main Task: - Implement advanced AES...

    ₹5000 (Avg Bid)
    ₹5000 Avg Bid
    2 bids

    I am in need of a compelling sales pitch for our IT services, specifically targeting large corporations. The sales pitch should prominently feature two of my main services: Active Directory Migrations, Consolidations, and On-prem migration to Azure AD. Key Benefits to Highlight: - Significant cost savings - Over 14 years of experience in providing top-tier IT services to some ...- Over 14 years of experience in providing top-tier IT services to some of America's largest companies Ideal Skills and Experience: - Significant knowledge in IT sector - Proven experience in sales pitch creation - Understanding of large business requirements - Familiarity with Azure AD and Active Directory. Previous Projects: Ascension Health domain Community Health Hospital Rockwest Bedrock AES P...

    ₹13001 (Avg Bid)
    ₹13001 Avg Bid
    8 bids

    ...As this is a subscription-based business, you should have proven strategies for creating compelling call-to-action content. Your expertise and creativity will be invaluable in reaching our goal: enticing more men over 40 to subscribe to our service, improving their life quality. - plan #1 ($299 registration fee) Includes: - New patient onboarding registration - Initial standard labs (CBC, CMP, ESTRADIOL, PSA, FSH & LH, TEST FREE & TOTAL) - Initial Dr. consult & lab review - Your first medication shipment is also included if approved for treatment. (Medication & treatment is NOT guaranteed. the patient must be a qualified canidate for TRT in order to be prescribed a treatment plan.) The $135.00 monthly fee covers the following: - monthly fee sta...

    ₹8334 (Avg Bid)
    Guaranteed Sealed
    ₹8334
    43 entries
    Trophy icon Lawn Care company logo Ended

    Looking for a skilled graphic designer who can help me out in creating a professional logo. My company provides lawn care services. The name of the company is Crabtree Lawn Solutions LLC. I like the idea of having a leaf or a blade of grass somewhere on the logo. The "T" in the word Crabtree could even be a tree. The logo will go on a company vehicle. I also want to add the phone number (256-473-9580) to the bottom of the logo. I really like the example logo that I have attached called "Evergreen". Key requirements for this job are as follows: - Color Palette: The dominant color scheme for the logo needs to be a harmony of green, white, and black. These colors should exude a playful and bold character. - Design Style: The designed logo needs to strike a ba...

    ₹4167 (Avg Bid)
    Guaranteed
    ₹4167
    657 entries

    ...vault in my Wildfly 26. The goal is bolstering the security of my data transmission, shielding sensitive data in transit. Features required: - Configure SSL/TLS to desire a 256-bit encryption standard, providing a high level of security, for secure data transmission. - Support for both TLS 1.2 and 1.3 protocols in the SSL/TLS configuration to enable both secure and reliable communication. - Implement Vault setup for effective protection of sensitive data. The ideal freelancer would have: - Extensive experience in handling Wildfly servers. - Detailed knowledge of SSL/TLS configuration and the ability to implement 256-bit encryption. - Familiarity with different TLS protocols and how to support multiple versions. - Proven record of setting up and managing Vaults. Your a...

    ₹1667 (Avg Bid)
    Guaranteed
    ₹1667
    1 entries

    this is for both bitcoin and litecoin address bitcoin bc1 and tb1 litecoin ltc1 address...understanding various programming concepts. -Bech32 Format Conversion: I am specifically interested in how to convert between formats using Bech32. Your experience with handling this encoding scheme's complexities would be very beneficial. -SHA-256 Functioning: Your in-depth understanding of SHA-256's operation is crucial. I'm not looking to implement it myself yet; I just want to understand how it works under the hood. Ideal skills and experience include a strong working knowledge of Python, expertise in the Bech32 encoding format, and an understanding of SHA-256 hashing algorithm functionalities. If you're a tenacious problem-solver with an educational sp...

    ₹11168 (Avg Bid)
    ₹11168 Avg Bid
    2 bids

    I'm looking for a proficient...focusing on their application in user authentication. Key Requirements: - Generation and verification of ECDSA signatures using Botan 2 and Botan 3 - Scripts should be designed for user authentication - The use of SHA-256 as the hashing algorithm for ECDSA signatures Ideal Skills: The ideal freelancer for this project will have extensive experience in Python development with proven knowledge of digital signatures, specifically ECDSA. Familiarity with Botan cryptographic library is a major requirement. They should also have a solid understanding of hashing algorithms, particularly SHA-256. Attention to detail and ability to meet deadlines is also a key expectation. Note: Please remember that I need two scripts, each compatible with Botan...

    ₹13834 (Avg Bid)
    ₹13834 Avg Bid
    26 bids

    Need a cyber security specialist to decrypt an AES-CTR encryption for a CTF flag. provided information : pcapng file for wireshark and the encryption method written in python

    ₹2000 (Avg Bid)
    ₹2000 Avg Bid
    6 bids