Cryptography jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,808 cryptography jobs found, pricing in INR

    ...nhage-Strassen algorithm ? F?rer's algorithm. The last functions are described below. ## Deliverables division:Here is an excerpt from wikipedia that I think explains things perfectly for division. "Methods designed for hardware implementation generally do not scale to integers with thousands or millions of decimal digits; these frequently occur, for example, in modular reductions in cryptography. For these large integers, more efficient division algorithms transform the problem to use a small number of multiplications, which can then be done using an asymptotically efficient multiplication algorithm such as Toom-Cook multiplication or the Sch?nhage-Strassen algorithm. Examples include reduction to multiplication by Newton's method as described above[5...

    ₹14952 (Avg Bid)
    ₹14952 Avg Bid
    4 bids

    “Java Password Based Encryption(JPBE)” Password-Based Encryption (PBE) derives an encryption key from a password. In order to make the task of getting from password to key very time-consuming for an attacker. JPBE is an implementation of Password-Based-Encryption which is developed on JAVA platform Using JCA(Java Cryptography Architecture).

    ₹31073 (Avg Bid)
    ₹31073 Avg Bid
    16 bids

    ...work effectively with others. - Solid knowledge of OpenGL 2.0 or higher, modern GPU programming techniques and computer graphics related math. - Solid knowledge of graphics engine architectures and engine optimization techniques. - Knowledge of Graphical User Interface programming. - Knowledge of various concepts covered in computer science such as computer networks, distributed systems, cryptography and network security, databases. Soft Skills: - Excellent professional communication (oral & written) & relationship skills - Comfortable communicating / working with all levels of organization - Collaborative - Comfortable working independently or part of a team - Team player - High attention to detail, prioritization skills and timeline and deadline underst...

    N/A
    N/A
    0 bids

    ...with others. - Solid knowledge of OpenGL 2.0 or higher, modern GPU programming techniques and computer graphics related math. - Solid knowledge of graphics engine architectures and engine optimization techniques. - Knowledge of Graphical User Interface programming. - Knowledge of various concepts covered in computer science such as computer networks, distributed systems, cryptography and network security, databases. Soft Skills: - Excellent professional communication (oral & written) & relationship skills - Comfortable communicating / working with all levels of organization - Collaborative - Comfortable working independently or part of a team - Team player - High attention to detail, prioritization skills and time...

    ₹6766 (Avg Bid)
    ₹6766 Avg Bid
    7 bids

    ...configuration changes, and it must be entirely self-contained. > > The backdoor must run in the background with no obvious indication that it exists. > > THE BACKDOOR MUST NOT BE .NET DEPENDENT. IT MUST BE ABLE TO RUN ON SYSTEMS THAT DON'T HAVE THE .NET FRAMEWORK INSTALLED. > SECURITY > All traffic too and from the backdoor needs to be authenticated encrypted using public key cryptography, the backdoor, in essence, will behave a lot like a standalone SSH server. > > The backdoor must NOT require Windows administrative access to run. > > The backdoor must implement survival techniques including injection of its code into a common Windows process, and restarting itself if it's killed or if it crashes. > ...

    ₹8353 - ₹41764
    ₹8353 - ₹41764
    0 bids

    Create a security application with user interface using simple C# codes. This program allow the use of different cryptography methods and different modes. Open source cryptography methods in C programming will be provided. (OpenSSL) Required to comment the program as much as possible. If you're hired, you're required to keep in contact with me throughout the project period. You are also required to answer queries if I have any questions.

    ₹11193 (Avg Bid)
    ₹11193 Avg Bid
    7 bids

    The project work involves the implementation of a cryptographic algorithm, method, or a protocol, and its demonstration. Please follow the guidelines below. cryptographic method- FEAL Algorithm. Platform: Windows LanguageL C language You need to devise an acceptable method of verification for the results produced by your implementation. A typical way is to check if the software produces the same set of output strings for a set of given input strings, as provided by a standard document (for example, ANSI, X9, IEEE standards). An important aspect of the project that it needs to have a method of demonstration built into it. After finishing your implementation, submit an electronic copy of the implementation and the demonstration system along with a READ ME f...

    ₹13365 (Avg Bid)
    ₹13365 Avg Bid
    3 bids

    I got Math questions and i need tutorial as well, related to the fallowing topics: Propositional calculus-notation and truth value Propositional calculus-truth tables Propositional calculus-proof Propositional calculus-more proof Sets: basic operations and Venn diagrams Sets: cardinality Sets: membershi...Sets: cardinality Sets: membership tables Statements about sets: Hybrid tables Predicates and Quantifiers Functions Relations: database queries Relations and Matrices Graphs: definitions, connectivity, Euler, Hamilton Graphs: adjacency matrix Breadth and Depth first search Networks: Dijkstra's Shortest Path Trees-heapsort Trees-coding Arithmetic of Congruences RSA cryptography Tractability & heuristic algorithms Only i have...

    ₹5429 (Avg Bid)
    ₹5429 Avg Bid
    8 bids

    ...programming), basic SMTP/IMAP protocol knowledge, Intermediate Shorewall/ any other command line interface based firewall knowledge, Experience with Telnet and SSH (Secure Shell), Skype and Email availability, 24h email response time. Desired Skills: Proficient in English verbal and written communication, some EC2 or Rackspace experience, Security oriented, Documentation writing skills, Interest in cryptography. Budget: Stages I-V 10-15 hours of work, additional stages TBD. Source: For a detailed writeup see here: Opportunity: At least 10 more stages (100+ hours) and / or monthly maintenance agreement Stage I Installation - all work completed 1. Rent out linux server - done, 2. Telnet / SSH - done, working fine 3. IP configuration on

    ₹12529 (Avg Bid)
    ₹12529 Avg Bid
    15 bids

    project related to cryptography in matlab. tool to be used is cryptool. We need to present digital signature methods here.

    ₹2506 - ₹8269
    ₹2506 - ₹8269
    0 bids

    i have task about **Cryptography** and security of network for more details drop a message if you interested need it within 5 days

    ₹7267 (Avg Bid)
    ₹7267 Avg Bid
    2 bids

    matlab cryptography related project is to be done. Details will be discussed in PMB.

    ₹13114 (Avg Bid)
    ₹13114 Avg Bid
    10 bids

    Designing a secure chat application Objectives can be summarized as: • Designing a secure Client/Server application • Using cryptography techniques such as: o Secret key cryptography. o Public key cryptography. o Hash functions. please check attached file

    ₹30571 (Avg Bid)
    ₹30571 Avg Bid
    5 bids

    I need an assignment done in the area of cryptography. More specifically I need an implementation of a HASH function.

    N/A
    N/A
    0 bids

    A Secure Model for Data Communication Using Cryptography & Matlab Steganography For more detail check Attached file and Also mention your price Thanks happy bidding

    ₹8353 (Avg Bid)
    ₹8353 Avg Bid
    1 bids

    I need to create a component that sends the price and my merchant ID to a external credit card processor web page. The API of the external credit card processor company sends the result of the payment process to my ...create a component that sends the price and my merchant ID to a external credit card processor web page. The API of the external credit card processor company sends the result of the payment process to my site, then I need to complete the order after that response. The merchant account has given us a php plug-in which receives certain response codes and basic form fields. It must also exchange cryptography keys between the bank and the website where the shopping cart (joomla/virtuemart) sits. We have a testing environment but the production environment works exactly...

    ₹22720 (Avg Bid)
    ₹22720 Avg Bid
    7 bids

    We need a desktop aplication like this. when user encrypt word file and picture it will encoding . then when the other part want to decoding file for read file, firstly user open our program and decode the file. and access the orginal file. for example remember enigma method, the letter not meanfull after plaintext. we want to mix some method and we add one power method. so , we need desktop aplication doing this job. and we want documantion about explain using method and coding explain.

    ₹5596 (Avg Bid)
    ₹5596 Avg Bid
    11 bids

    I want to by articles about applied mathematics. Show me a proof of concept with EXCEL formulation to ensure that you know how the topic you want to write works. $10 per 1,000 words. I don't pay junks articles. This is a long term project, let me know when you have the proof of concept. Her...project, let me know when you have the proof of concept. Here is a list for you to get some idea. 1. Linear forecasting 2. Linear backcasting 3. Fourier analysis in time domain 4. Bayesian decision 5. Bayesian search 6. Bayesian profiling 7. Image recognition 8. Normal convergence 9. Sir Fisher’s exact test 10. Optimization 11. GPS -- the one that is used in your car 12. Cryptography -- RSN, One Time Pad 13. Survey sampling -- PPS seq, Composite size mea...

    ₹8854 (Avg Bid)
    ₹8854 Avg Bid
    3 bids

    ...org/papers/ Select one of the papers and write about what you discovered from reading the paper. There are papers here that explain the concept of "Know Your Enemy." The "hacker" community operates a lot like warfare; defending against them requires an understanding of how they operate. This site is a great place to gather that type of information. B Cryptography. This paper can be on an algorithm, protocol or a white paper on Cryptography. At a minimum your paper should describe the following: history, security considerations (i.e.,: has it been hacked, cracked, or is it a concept), where is it being applied, or planned to be applied. C Digital Millenium Copyright Act (DMCA). The DMCA has made quite an impact on Internet Security. Your paper...

    ₹8102 (Avg Bid)
    ₹8102 Avg Bid
    2 bids

    Want the below project to be done

    ₹10859 (Avg Bid)
    ₹10859 Avg Bid
    2 bids

    Some skills that the programmer should have are: C / C++ / C# PE Cryptography Network Protocol / Firewall Security x86 x64 Windows Applications Proxy / Reverse Proxy Sockets / Threading Automatic Updating Remote Management of applications from Control Panel Creative problem solver - not looking for someone to do a half ass job just to get paid. You should be proud of your work. Excellent performance = big bonuses. Let me know what your qualifications are and why you want to work with us. (don't copy/paste resume please) We have the source to all our existing applications. Need someone who wants to keep everything working smooth and add new features.

    ₹51119 (Avg Bid)
    ₹51119 Avg Bid
    12 bids

    Some skills that the programmer should have are: C / C++ / C# PE Cryptography Network Protocol / Firewall Security x86 x64 Windows Applications Proxy / Reverse Proxy Sockets / Threading Automatic Updating Remote Management of applications from Control Panel Linux/Unix / SQL Creative problem solver - not looking for someone to do a half ass job just to get paid. You should be proud of your work. Excellent performance = big bonuses. Let me know what your qualifications are and why you want to work with us. (don't copy/paste resume please) We have the source to all our existing applications. Need someone who wants to keep everything working smooth and add new features.

    ₹31407 (Avg Bid)
    ₹31407 Avg Bid
    19 bids

    The following are requests for running RSA and ECC algorithms in smart cards. Any suggestions are as for reference and if you think any other is more suitable your proposal is welcome. REQUESTED JOBS/RESULTS: Applied cryptography: Encryption/ Decryption & Signing /Verifying. COMPARISONS: Processing speed, code size (ROM), memory size (RAM). Reference of the used field arithmetic. RSA IMPLEMENTATION: 1. RSA implementation of 1536 & 2048-bit 2. Public Key b=3 , b=216+1 3. Factorization 4. RSA code written in Java or C, (?taken from OpenSSL library?) ECC IMPLEMENTATION: 1. UNDERLYING FIELD: Fp or F2m . Preferably F2m with m=233 & m=283. Suggested by NIST-SECG 2. REPRESENTATION BASE F2m : polynomial or normal. Preferably polynomial 3. ELLIPTIC CURVE over F2m : preferably ran...

    ₹48279 (Avg Bid)
    ₹48279 Avg Bid
    1 bids

    ...security threats, 2nd edition, Addison-Wesley, Boston 6. Ashbourn J., Biometrics - Advanced Identity Verification, Springer-Verlag, UK, 2000. 7. Humphreys E.J, Moses R.H., Plate A.E., Guide to Risk Assessment and Risk Management, BSI, UK, 1998. 8. Icove D, Seger K, VonStroch W (1995) Computer Crime, A Crimefighter's Handbook, O'Reilly & Associates, Inc, Sebastopol, CA 9. Scheiner B., Applied Cryptography, John Wiley & Sons Inc., USA, 1996Thorenson J.D., Blankenship J.H., Information Secrets, Valuable Information Ltd, USA, 1996. Knowledge Management literature: 1. I. Becerra-Fernandez, A. Gonzales, R. Sabherwal. Knowledge Management: Challenges, Solutions, and Technologies, Pearson Prentice Hall, 2004. 2. E. M. Awad, H. M. Ghaziri. Knowledge Management, ...

    ₹5596 (Avg Bid)
    ₹5596 Avg Bid
    9 bids

    Dreambox is looking for network programmers for its large scale presentation system whi...topics such as media transfer, real-time stock query, inter-module communication and etc. - Design and Implementation of Client/Server for these protocols and integration to project. - Design and Implementation of Encryption and Data Security parts. Required Skills: - Very strong programming and debugging skills in C and C++ - Solid knowledge of computer networks, distributed systems, cryptography and network security, databases. - Knowledge of UML modeling and ability to design, read and realize diagrams. Important Notes: - This is an on-site work that developer will be asked to move in Istanbul during the project. - All accomodation and transportation costs will be undertaken by...

    ₹419729 (Avg Bid)
    ₹419729 Avg Bid
    20 bids

    I want you to implement parts of the Digital Signature Standard, a US standard for digital signatures. In particular, your task is to implement the signing and verification operations. In addition, you shall implement a check on DSA parameters, as detailed below. Have a look to the pdf for more information... The job has to be done before sunday 28, 23.59.

    N/A
    N/A
    0 bids

    Hello , I need to write 4 academic research papers in one or more than one of the following areas: 1- Computer Networks 2- Network Security 3- Fault Tolerant Computing 4- Cryptography 5- Neural Networks 6- Genetics Any hot topic under one of these areas is acceptable. The research has to be original, supported by experimental or simulated data, and the papers have to be publishable in a reputable US journals.

    ₹39509 (Avg Bid)
    ₹39509 Avg Bid
    2 bids

    Lowest bid gets the project. Please inform me which platform you would like to use before I accept the bid from you. This project is about cryptography, PARI/GP system. ## Deliverables 1) All deliverables will be considered "work made for hire" under U.S. Copyright law. Employer will receive exclusive and complete copyrights to all work purchased. (No 3rd party components unless all copyright ramifications are explained AND AGREED TO by the employer on the site per the worker's Worker Legal Agreement). ## Platform Windows XP

    ₹2506 - ₹3341
    ₹2506 - ₹3341
    0 bids

    ANSI X9.17 Pseudo Random Lottery generator. READ ME file for Cryptography Project. Project: ANSI X9.17 Pseudorandom Number Generator Programming Language used for implementation: Java Platform: Windows (need to have java installed on machine) NOTE : You can click on the link below to get some idea how the application should be somewhat like. But we need to have it different than this one. 1. Firstly , we need the user to choose lucky numbers and then compare with the ANSI X9.17 random numbers generator. If the users numbers match, then there is a lotto won. 2. Secondly, the link doesnot generate the random numbers all the time, so every number in a lotto should be unique. 3. The figure below shows the steps in ANSI X9.17 . It uses Triple DES , encryption decrypt...

    ₹7350 (Avg Bid)
    ₹7350 Avg Bid
    7 bids

    Hello All! I search a developer who may create me on-line shop with PGP cryptography of all database.

    ₹51203 (Avg Bid)
    ₹51203 Avg Bid
    7 bids

    I need someone to write my PhD thesis (100 pages) on quantum chemistry and cryptography.

    N/A
    N/A
    0 bids

    budget: $3000-$5000 keywords: C Programming, C++ Programming, Cryptography, Electronics, Embedded Software, Engineering i am looking for an experienced VeriFone developer that can modify a Vx 670. you must be able to commit and deliver 100% on schedule with no exception. the pos terminal must function offline eliminating the need for a remote host. software is required to download data stored on the pos terminal. full specifications will be provided to qualified bidders. good written english, icq with otr encryption and email with gnupg encryption are required. ## Deliverables 1) All deliverables will be considered "work made for hire" under U.S. Copyright law. Employer will receive exclusive and complete copyrights to all work purchased. (No GPL, GN...

    ₹354995 (Avg Bid)
    ₹354995 Avg Bid
    3 bids

    I have an undergrad-level assignment of number theory and cryptography. Basic stuff: factoring, proofs about rings, groups etc. I need your help either by emails or chat sessions. I will either pay flat rates, project rates, and/or bonuses. You must demonstrate a background on number theory and cryptography (e.g. link to a course website or name of the book, or list of topics). Details of the assignment to the winning bidder.

    ₹4260 (Avg Bid)
    ₹4260 Avg Bid
    1 bids

    I need a Silverlight for Windows Phone > Windows Phone Class library that implements the RSA algorithms in the Bouncy Castle cryptography library. The full source code library in C# can be found at <>. I need you to extract the RSA encryption files, and port them to a Windows Phone Class library. The catch is that Hashtable and Arraylist are not supported in Windows Phone Class and so you’ll need to write a quick implementation of the mscorlib classes. I would like a VS 2010 project with source code that compiles as the deliverable. ## Deliverables Please ask if you have any questions.

    ₹5262 (Avg Bid)
    ₹5262 Avg Bid
    1 bids

    I have purchased a copy of the latest REPORTS/INTEL, expl...can be deduced from the results of an empirical test if the practitioner uses completely different parameters in his own simulation problem. In contrast to theoretical tests, empirical tests treat the random number generators as black boxes and do not directly analyze the underlying algorithm. This makes it possible to observe the performance for smaller and larger parts of the period. In cryptography, as soon as we can distinguish a given bitstream from the output of a "perfect random source", attacks to the algorithm will be possible. The difficulty is to find such distinguishers and to mount an efficient attack. Use the Report that tests every RNG to help you understand the RNG in full facts.' Than...

    N/A
    N/A
    0 bids

    I need a programmer to create a user friendly program with pleasant interface: "Playfair Cipher Decoder". Programmer needs to understand something about cryptography and ciphers. Program should be windows based not a dos based program. It can be a script as part of a website but I will also need a standalone program. Please see attachment for details and suggested code. Thank you for bidding.

    N/A
    N/A
    0 bids

    I need a programmer to create a user friendly program with pleasant interface: "Playfair Cipher Decoder". Programmer needs to understand something about cryptography and ciphers. Program should be windows based not a dos based program. It can be a script as part of a website but I will also need a standalone program. Please see attachment for details and suggested code. Thank you for bidding.

    N/A
    N/A
    0 bids

    this project is about network security and cryptography. ## Deliverables 1) All deliverables will be considered "work made for hire" under U.S. Copyright law. Employer will receive exclusive and complete copyrights to all work purchased. (No 3rd party components unless all copyright ramifications are explained AND AGREED TO by the employer on the site per the worker's Worker Legal Agreement). ## Platform windows involves network security and cryptography

    ₹418 - ₹835
    ₹418 - ₹835
    0 bids

    It is a combination of cryptography and steganography. cryptography converts the plain text to cipher text. steganography inserts the secret message into the image. Cryptography is the extension of hill cipher algorithm. it is the secured one. Dynamic LSB-3 is the steganography algorithm.

    ₹30321 (Avg Bid)
    ₹30321 Avg Bid
    11 bids

    The following are requests for comparisons of RSA vs ECC cryptography. Methods, arithmetic and other topics are as for reference and any suggestion you think it is more suitable is welcome. REQUESTED JOBS/RESULTS: Applied cryptography: Encryption/ Decryption & Signing /Verifying Comparisons: Processing speed, code size (ROM), memory size (RAM). Also you should let us know the arithmetic used in fields, ECC and RSA and any improvement methods. Also you should deliver us the source code. SYSTEM IMPLEMENTATION RSA IMPLEMENTATION: 1. RSA implementation of 1024 & 2048-bit 2. Numbers?? b=3 , b=216+1 3. Factorization? NFS? 4. RSA code written in Java or C, (?taken from OpenSSL library?) ECC IMPLEMENTATION: 1. UNDERLYING FIELD: Fp or F2m . Preferably F2m with m=233 & 283....

    ₹61477 (Avg Bid)
    ₹61477 Avg Bid
    3 bids

    The following are requests for comparisons of RSA vs ECC cryptography. Methods, arithmetic and other topics are as for reference and any suggestion you think it is more suitable is welcome. REQUESTED JOBS/RESULTS: Applied cryptography: Encryption/ Decryption & Signing /Verifying Comparisons: Processing speed, code size (ROM), memory size (RAM). Also you should let us know the arithmetic used in fields, ECC and RSA and any improvement methods. Also you should deliver us the source code. SYSTEM IMPLEMENTATION RSA IMPLEMENTATION: 1. RSA implementation of 1024 & 2048-bit 2. Numbers?? b=3 , b=216+1 3. Factorization? NFS? 4. RSA code written in Java or C, (?taken from OpenSSL library?) ECC IMPLEMENTATION: 1. UNDERLYING FIELD: Fp or F2m . Prefe...

    ₹67825 (Avg Bid)
    ₹67825 Avg Bid
    12 bids

    Top cryptography Community Articles