Encryption jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    5,000 encryption jobs found, pricing in INR

    I am looking for help transmitting orders from a website into a POS system. The order is transmitted via an encrypted email. We have not been able to eliminate the errors.

    ₹95873 (Avg Bid)
    ₹95873 Avg Bid
    5 bids

    I need someone to change the login from my panel to use my IPBforum’s database. I already have a script that uses its encryption and such so it should be easier. Additionally I will need a form in that panel where you enter a username (located in the forum’s database) and it will set two values to NULL

    ₹12672 (Avg Bid)
    ₹12672 Avg Bid
    7 bids

    ...security Many security features, which include i.e.: --> Use TLS connectivity for handshake --> Use VPN connection for additional security --> Use ZRTP encryption protocol on VoIP (voice and video) communication --> Use text encryption for messaging and file sending --> Database security on app and server --> Secure connection settings --> Use code obfuscation protection + Sign the app --> Harden the security of application / program --+ Encrypt the entire application --+ Containerize the entire application --+ Encrypt the database --+ Lock screen / Login protection --+ Brute force protection --+ Code hardening by Pro+iX Guard --+ Store encryption keys securely in Trusty --> Set privacy settings - Design customization Many security featur...

    ₹194831 (Avg Bid)
    ₹194831 Avg Bid
    10 bids

    Hi, I have some issue with the code. Your job would be to fix it, and would implement some algorithm. Details will be shared later. Having encryption knowledge is helpful Thanks!

    ₹500 / hr (Avg Bid)
    ₹500 / hr Avg Bid
    13 bids

    This is an app development with the ...and like proactive people, who will be able to give the direction of how to develop in the easy and most cost effective the way the minimal viable product. The idea is very simple but requires following functions, geolocation possibility, video, audio, and text chatting, online payments, online consultation booking, synchronizing with many calendar systems, being very secure (some degree of encryption of the data). I am posting this now and will be answering to offers within first 24h and make my decision as soon as I find suitable person please if no one is chosen it is due to the skills sets required. Please in your bid list the skills you have and state your budget for this project. There is no budget 2500-4500 so I am posting as a mediu...

    ₹251188 (Avg Bid)
    NDA
    ₹251188 Avg Bid
    67 bids

    Im looking for a devloper who can create a secure messaging app for me with off shore servers for a small franchise that I am working with. The app requires to run strict protocols and all is to be encrypted with ECC encryption. Ideally im looking for someone with previous experience in ECC/PGP etc etc development.

    ₹2084 / hr (Avg Bid)
    ₹2084 / hr Avg Bid
    14 bids

    Hi I need someone to reverse engineer a specific game's requests to its server. The end goal is to be able to decode, change and re-encode our own version of the request to the server. I have the JSON/fiddler requests already if you need an example of what the encryption looks like. PS: This is an android game, so you should have experience reverse engineering parts of android games. PPS: This is not HTTPS/SSL encryption - that part is already decrypted. you have to drag a jigsaw in a hole to complete the picture

    ₹20592 (Avg Bid)
    ₹20592 Avg Bid
    6 bids

    Decrypt Database files. I need to be able to export all of the data a set of DBF database encrypted files? These file are purposely encrypted by the creators. Have you successfully decoded dbf files with heavy encryption, as a reverse engineer or database decoder?

    ₹10838 (Avg Bid)
    ₹10838 Avg Bid
    4 bids

    Have two parts in this project. a & b. The project requirements are in the pictures below.

    ₹3335 (Avg Bid)
    ₹3335 Avg Bid
    7 bids

    I need someone who can decrypt an android apk and provide me the formula used for generating 2 header fields sent as http request. It should be a 10 - 15 minute job for someone who knows how to do it. I am not looking for someone willing to learn and I will ignore bot bids. Thanks.

    ₹17507 (Avg Bid)
    ₹17507 Avg Bid
    9 bids

    Looking good python developer who have good knowledge on dash streaming and encryption for create a personal video downloader tools.

    ₹13089 (Avg Bid)
    ₹13089 Avg Bid
    4 bids

    Need a web application - Define excel templates To upload excel files - daily sales / service / enquiry from different branches - Validate the uploaded excel data - SHow error records which is not matching the validation logic - Provide form to edit records -Dashboard to view uploaded excel status - Ability to download excel files - Show different reports Final output file will have 250 ...download excel files - Show different reports Final output file will have 250 columns out of which 50 are calculated columns Sample input / output files attached Looking for a proposal with list of forms to be developed, tech stack, architecture, timeline to develop Future Scope (Not to be included in this project) Business Intelligence reports Graph representation Secure access Database encr...

    ₹25677 (Avg Bid)
    ₹25677 Avg Bid
    12 bids

    Hello, i created an app in C# and now i want to have the same thing on android phone. The app must contain 5 input text (1 password). The fields must update while typing. While typeing something must be done using DES 64 CBC encryption, and the output must be the same as the C# app (i tried several online DES CBC but they result in a different output). I can't tell every detail, because i think this might be a good idea. So if you like to bid on this project, you must also be able to read C# code (to ensure output will be the same). I can provide a working VS 2015 project.

    ₹16173 (Avg Bid)
    ₹16173 Avg Bid
    6 bids

    Neec a Amazon Prime Video Downloader Who can Explain me How to download it , Without Encryption

    ₹2001 (Avg Bid)
    ₹2001 Avg Bid
    1 bids

    We been attached by ransomware .com

    ₹20842 (Avg Bid)
    ₹20842 Avg Bid
    1 bids

    Looking good python developer who have good knowledge on dash streaming and encryption for create a personal video downloader tool.

    ₹22676 (Avg Bid)
    ₹22676 Avg Bid
    6 bids

    Need for PCI certification for a custom platform with web control panel and iOS/Android mobile applications. The level of certification should cover the components invol...of the card is stored neither in the apps nor in the server, the only thing that is stored is the token that the bank returns to us. Development status: Beta Nº of transactions: 0 . In general we are interested in the level that implies a lower number of transactions, which in principle is the most basic and is the one that fits with the startup models. TLS 1.2 certificate for communications encryption (required for PCI certification) Components: - Web control panel (custom Backend). Hosted by Amazon AWS - iOS Mobile App (Not yet published). Native development - Android mobile app (not yet published). Nati...

    ₹47770 (Avg Bid)
    ₹47770 Avg Bid
    9 bids

    Problem Statement Which encryption algorithm AES256(ECB mode), ChaCha 256 (20 rounds), Speck 256 (ECB mode) and Speck small 256 (ECB mode) would produce the best performance results (encryption/decryption time, memory power, power usage)? Expected Contribution Performance comparison of four encryption algorithms AES256(ECB mode), ChaCha 256 (20 rounds), Speck 256 (ECB mode) and Speck small 256 (ECB mode) implemented on an electronics platform (Arduino Mega). Methodology To measure the performance of algorithm we need to measure encryption/decryption time, memory, power usage. Encryption/decryption time can be measured by using function micros (), which is included in Arduino Language. To measure power consumption, we obtained the values for vol...

    ₹834 (Avg Bid)
    ₹834 Avg Bid
    1 bids

    I am looking for a Raspberry Pi 3 B+ programmer not sure ...RPI based, but the adopisowifi is designed for the Raspberry 3 B and B+. There is a download section at the adopisowifi site if you want to get a demo version of the software and try running it or checking on the coding and how it runs and how it was made. I'll need a software similar to adopisowifi, with the same functionalities like using external wifi routers or repeaters, product key encryption and verification, customizable portal page, remote monitoring of the machine, plus some other features. I am looking to hire for one time programming or we can do a partnership for long term business. You can PM me thru facebook just place in the message Raspberry programmer or txt or call [Removed by Freelancer.com ...

    ₹13256 (Avg Bid)
    ₹13256 Avg Bid
    10 bids

    ...security Many security features, which include i.e.: --> Use TLS connectivity for handshake --> Use VPN connection for additional security --> Use ZRTP encryption protocol on VoIP (voice and video) communication --> Use text encryption for messaging and file sending --> Database security on app and server --> Secure connection settings --> Use code obfuscation protection + Sign the app --> Harden the security of application / program --+ Encrypt the entire application --+ Containerize the entire application --+ Encrypt the database --+ Lock screen / Login protection --+ Brute force protection --+ Code hardening by Pro+iX Guard --+ Store encryption keys securely in Trusty --> Set privacy settings - Design customization Many security featur...

    ₹201667 (Avg Bid)
    ₹201667 Avg Bid
    18 bids

    ...you must annotate each one. That is, you must write at least a paragraph about each article explaining what you learned from it. After you have read the articles write a one page single spaced proposal explaining what your 12 minute presentation will be about. You must explain why this topic is important and what you will be explaining in your presentation. Subject such as database security, encryption, and disaster recovery are too broad and inappropriate for this assignment. You should find something you think most of your classmates do not know and will be excited to learn. Topics such as how to create a culture of security in an organization, security concerns when migrating to the cloud, and how to write a business associate agreement under HIPAA are good topics. You must ...

    ₹3668 (Avg Bid)
    ₹3668 Avg Bid
    15 bids

    ...security Many security features, which include i.e.: --> Use TLS connectivity for handshake --> Use VPN connection for additional security --> Use ZRTP encryption protocol on VoIP (voice and video) communication --> Use text encryption for messaging and file sending --> Database security on app and server --> Secure connection settings --> Use code obfuscation protection + Sign the app --> Harden the security of application / program --+ Encrypt the entire application --+ Containerize the entire application --+ Encrypt the database --+ Lock screen / Login protection --+ Brute force protection --+ Code hardening by Pro+iX Guard --+ Store encryption keys securely in Trusty --> Set privacy settings - Design customization Many security featur...

    ₹98208 (Avg Bid)
    ₹98208 Avg Bid
    19 bids

    ...security Many security features, which include i.e.: --> Use TLS connectivity for handshake --> Use VPN connection for additional security --> Use ZRTP encryption protocol on VoIP (voice and video) communication --> Use text encryption for messaging and file sending --> Database security on app and server --> Secure connection settings --> Use code obfuscation protection + Sign the app --> Harden the security of application / program --+ Encrypt the entire application --+ Containerize the entire application --+ Encrypt the database --+ Lock screen / Login protection --+ Brute force protection --+ Code hardening by Pro+iX Guard --+ Store encryption keys securely in Trusty --> Set privacy settings - Design customization Many security featur...

    ₹72280 (Avg Bid)
    ₹72280 Avg Bid
    9 bids

    ...as well as email and phone number with OTP verification. 2. After login, the home panel must contain nearby studio, service provided and more. Location can be tracked via Geolocation feature or ask to be manually inputted by the user. 3. Cache enabled, not all data can be accessed from the cloud, some must be stored locally for faster processing. 4. Payment gateways with a secure end to end encryption. 5. After making a purchase, the user must be given an SMS code or a QR code to be shown at Studio. 6. After usage of services, there must be an option to leave review and rating. Having a referral system work great in increasing the chain of marketing. 7. Cancellation and refund process should be as smooth as possible and without much hassle. than the above, showing scheduled...

    ₹40017 (Avg Bid)
    ₹40017 Avg Bid
    27 bids

    This supersedes the previous. Looking to hire skilled developers to create a new cryptocurrency exchange in node.js / EJS scripting. Also requires VPN tunneling knowledge. Needed individuals with a demonstrable portfolio previous node.js and angular projects - pref...in node.js / EJS scripting. Also requires VPN tunneling knowledge. Needed individuals with a demonstrable portfolio previous node.js and angular projects - preferably in financial services. Expect to be asked to demonstrate your coding skills to the project manager. We expect applications from real full stack developers with a range of front-end and back-end technologies. Blockchain and encryption knowledge is welcomed. International company with many other projects available for the successful. Fluent English is...

    ₹1584 / hr (Avg Bid)
    ₹1584 / hr Avg Bid
    29 bids

    We are searching for a experienced asp.net developer with vb.net knowledge. We have a set of around 250 aspx files, which are created with a conversion tool from an access database. We would like to assess if a combination of the webf...conversion tool from an access database. We would like to assess if a combination of the webforms with MVC is possible. (as described here: ). Besided debugging the files we would like to extend the project with certein functionalities: - admin dashboard (adminlte for example) - user management/ login - encryption of database and ssl- encryption - design modifications Generic standard texts will not be answered.

    ₹1000 (Avg Bid)
    ₹1000 Avg Bid
    7 bids

    ...proof-of- concepts and pilots in at least one of the blockchain platforms - Ethereum, Hyperledger, Multi-chain. • Experience in Open source tools and technologies Understanding of Bitcoin or other crypto currencies • Understanding of various distributed consensus methodologies (Mining, PoS, etc). • Understanding of cryptography, including asymmetric (pub/priv key), symmetric, hash functions, encryption/signatures. • Knowledge of versioning systems Git etc. • Passion for best design and coding practices and a desire to develop new bold ideas HIGHLY DESIRABLE EXPERIENCE • Hands-on experience in using a number of the following languages: Java, Golang, Scala, Haskell, Erlang, C, C++ • Good Software Engineering skills, insights, and experience &bull...

    ₹1917 / hr (Avg Bid)
    ₹1917 / hr Avg Bid
    12 bids

    Project Overview: -Install all required libraries and dependencies -Installs MySQL or configures the database connection to an existing database, e.g. PostgreSQL -configure Apache webserver -setup SSL encryption -configure email settings Refence URL :

    ₹1834 (Avg Bid)
    ₹1834 Avg Bid
    4 bids

    Hi all, Creating a payment module to connect with our gateway. All communication with the gateway is done using SSL encryption and no confidential cardholder data is ever stored on the Magento 2 website. A process called tokenization is used to run transactions with stored payment information. This lets the customers pay with a 'saved' card which are not stored on the magento 2 server at all. When a customer visits the store and make checkout, he needs to select the payment method at the checkout, while selection of the payment gateway, he will need to enter the credit card information. He will be able to save the credit card to make further transaction easy and fast. So next time when he comes for the purchase, he will just need to select saved credit card. Customer will...

    ₹33681 (Avg Bid)
    ₹33681 Avg Bid
    20 bids

    Project Requirements: Create simulation with Matlab for Secure Phase-Encrypted IEEE 802.15.4 Transceiver Design Using RC4 encryption with different key size range starting from : 64,128 and 256 bit. Matlab for Secure Phase-Encrypted IEEE 802.15.4 Transceiver Design Using Rabbit Encryption Deliverables: Matlab code Flowchart Data reports : Bit error rates, Cipher size, execution time (Encryp/Decrypt) Schedule for Completion : 10 days maximum

    ₹14756 (Avg Bid)
    ₹14756 Avg Bid
    4 bids

    Looking to hire skilled developers to create a new cryptocurrency exchange in node.js / angular. Needed individuals with a demonstrable portfolio previous node.js and angular projects - preferably in financial services. Expect to be asked to demonstrate your coding skills to the project manage...developers to create a new cryptocurrency exchange in node.js / angular. Needed individuals with a demonstrable portfolio previous node.js and angular projects - preferably in financial services. Expect to be asked to demonstrate your coding skills to the project manager. We expect applications from real full stack developers with a range of front-end and back-end technologies. Blockchain and encryption knowledge is welcomed. International company with many other projects available for the s...

    ₹2418 / hr (Avg Bid)
    ₹2418 / hr Avg Bid
    40 bids

    Hello, for an project i need a proptype of pusher channel api in classic ASP. (Not asp.net!) From the webserver i need to be able to sent Events to a channel. So there should be a function to sent an event to a channel in classic asp. The pusher API documentation can be fou...should be a function to sent an event to a channel in classic asp. The pusher API documentation can be found here: You can create a test account for free or we will deliver you the API key and information at the start of the project. We use for encryption (Rest, md5, SHA256 HMAC) etc the libraries of Chilkat A 30 day demo can be downloaded from the website. You should use these libraries for for encryption and posting

    ₹18008 (Avg Bid)
    ₹18008 Avg Bid
    7 bids

    Hi, I need : Amazon EBS Encryption, Encryption Key Management with customer master key & Audit logs to be integrated in the application.

    ₹417 / hr (Avg Bid)
    ₹417 / hr Avg Bid
    3 bids

    I need you to develop some software for me. I would like this software to be developed for Windows using Python. The tasks are as follows: - Random data generations - Each generation of data will have different sets of values - Each data generations will be encrypted - The encryption method will be from an SDK i currently have and will be converted from Java to Python and will be replicated and used for encrypting the data. Further details please message me I will not award someone not until there is a complete result. I am sick and tired of awarding people and not able to do the project so do not ask me to award you! You will have to start with the project, show the result via teamviewer or any desk and if i am satisfied, you will send the code then I will release the milest...

    ₹100709 (Avg Bid)
    ₹100709 Avg Bid
    22 bids

    ...to consider: a. Is BYOD Allowed? b. Physical Security c. Do you have a standardised device type, what happened when they are end-of-life? d. Minimum OS Requirement e. Lost and Stolen Policy, Device Pool Replenishment f. Are users allowed to install their personal apps? g. Are personal use allowed? Limits on personal use? Can the organisation wipe personal data? h. Device passcode requirement/ Encryption requirement i. Is SD Cards on devices allowed j. Periodic Wipe? k. Compromise Device Policy (i.e. what would you constitute a compromised device that is consider unsafe?) l. Must the user bring their device to work? What if they didn’t? m. Can the organisation track the owner’s location? Do we tell them they are being tracked? n. Etc. Assignment Format Minimum Del...

    ₹4502 (Avg Bid)
    ₹4502 Avg Bid
    12 bids

    need to build Mac OS file encryption program

    ₹20842 - ₹62526
    ₹20842 - ₹62526
    0 bids

    Hi, I need : Amazon EBS Encryption, Encryption Key Management with customer master key & Audit logs to be integrated in the application.

    ₹333 - ₹584 / hr
    ₹333 - ₹584 / hr
    0 bids

    Hi, I need : Amazon EBS Encryption, Encryption Key Management with customer master key & Audit logs to be integrated in the built application.

    ₹167 - ₹667 / hr
    ₹167 - ₹667 / hr
    0 bids

    Hi all, We need to create a module to connect a magento 2 store to our payment gateway. All communication with the gateway is done using SSL encryption and no confidential cardholder data is ever stored on the Magento 2 website. A process called tokenization is used to run transactions with stored payment information. This lets the customers pay with a 'saved' card which are not stored on the magento 2 server at all. When a customer visits the store and make checkout, he needs to select the payment method at the checkout, while selection of the payment gateway, he will need to enter the credit card information. He will be able to save the credit card to make further transaction easy and fast. So next time when he comes for the purchase, he will just need to select saved c...

    ₹29095 (Avg Bid)
    ₹29095 Avg Bid
    23 bids

    We need a website with the following features built. I would also like to have a chat. The website itself:- Session Management:- Once a user logs a unique session is started the sourceIP and the browser type is stored, this ... Cross side scripting:- WE use a token to is part of a hidden form and send to the client whenever a post is done the tokens are compared to see if they are valid. Traffic between the components:- Traffic between the client - webserver - database are all encrypted (SSL). Survey API:- traffic from the survey API to the databases are also encrypted using SSL, however no encryption happens between then factory worker and the api(SMS and IVR). Instance Access:- Access to the server instance(CentOS) is only done by mea...

    ₹182159 (Avg Bid)
    ₹182159 Avg Bid
    50 bids

    I would like to build a payment interface using encryption and bar codes linked to credit and debit cards.

    ₹210963 (Avg Bid)
    ₹210963 Avg Bid
    114 bids

    • POLICY • VeraCrypt is an open-source utility used for on-the-fly encryption. It can create a virtual encrypted disk within a file or encrypt a partition or the entire storage device with pre-boot authentication. PLEASE NOTE: Accepted reports must follow VeraCrypt's Security Model (see attached PDF) • QUALIFICATION • Only CRITICAL vulnerabilities that demonstrate complete compromise of the system's integrity or confidentiality are eligible for payment - typically Arbitrary Code Execution or equivalent impact. Lower severity issues are not in scope at this time and will not be paid. YOU MUST DEMONSTRATE THAT REMOTE EXPLOITATION OF THIS BUG CAN BE EASILY, ACTIVELY, AND RELIABLY ACHIEVED. Awards are increased for fixes that include giving the...

    ₹20842 - ₹62526
    ₹20842 - ₹62526
    0 bids

    Basically there is a website that does client side encryption of a form via adyen before submitting the information. Basically I need a program(script) that is able to replicate what is done with the client side encryption and return me the data that I would enter into the form encrypted just like the client side encryption does, but in my c# program. I have the website source code, the javascript which does the client side encryption and there are also examples that illustrate how the adyen client side encryption works which should make it easier to understand.

    ₹15006 (Avg Bid)
    ₹15006 Avg Bid
    7 bids

    You must understand hashes and encryption for this is a long-term project. So, i require advanced freelancers

    ₹191663 (Avg Bid)
    ₹191663 Avg Bid
    19 bids

    Scope 1: Web services application with Raspberry Pi & Java a. Fine tune Raspberry Pi with Java web services application including updating of encryption key with available source codes, etc. Including testing. within 2 weeks. b. Software monitoring tool to provide system alerts including testing. 1 week c. Build management documentation with versions including source code documentation for item a. 1 week d. Attend project meeting with customer software developers and collaboration to fine tune software. e. Support official launch period f. Additional software related tasks may be provided during project period of 2 months. Scope 2: develop C# interface a. Develop integration between access control systems via C# and datapoint servers. Including testing. 5 weeks b. Software mo...

    ₹458358 (Avg Bid)
    ₹458358 Avg Bid
    27 bids

    Implement an encryption function that performs one round of encryption using S1 and S2 boxes with key generation schemes. Use binary plaintext (i.e. 100010110101 and key = 111000111) and print out the bit strings of L1R1, L2R2, L3R3, L4R4. Implement a decryption function that performs one round of decryption using the S1 and S2 boxes, and decrypts the L4R4 while printing out the bit strings of L3R3,L2R2,L1R1.

    ₹3085 (Avg Bid)
    ₹3085 Avg Bid
    5 bids

    i need a bank website which gives interfaces like login page, transactions page and security features for the website like captche, 3 secutiry questions, honeypot, encryption for transactions.

    ₹8504 (Avg Bid)
    ₹8504 Avg Bid
    2 bids

    ...system shall compare the free text submissions against the defined standard and report IF and TO WHICH EXTENT the submission(s) are compliant with the standard. Example: - Standard: All communication between the supplier data center and the customer data center have to be encrypted. - Customer 1 submission: We use a Layer 1 encryption between on the WAN connection between data centers. - Customer 2 submission: Our WAN connection partner uses an optional encryption service on their WAN connection lines. - Customer 3 submission: Supplier uses xyz company product to encrypt all data going out of the supplier DC LAN. The AI should report: - Customer 1: Compliant - Customer 2: Non Compliant - Customer 3 Compliant. Obviously the AI would have to be trained for this. ...

    ₹16674 (Avg Bid)
    Featured
    ₹16674
    3 entries

    Hi all, We need to create a module to connect a magento 2 store to our payment gateway. All communication with the gateway is done using SSL encryption and no confidential cardholder data is ever stored on the Magento 2 website. A process called tokenization is used to run transactions with stored payment information. This lets the customers pay with a 'saved' card which are not stored on the magento 2 server at all. When a customer visits the store and make checkout, he needs to select the payment method at the checkout, while selection of the payment gateway, he will need to enter the credit card information. He will be able to save the credit card to make further transaction easy and fast. So next time when he comes for the purchase, he will just need to select saved c...

    ₹35098 (Avg Bid)
    ₹35098 Avg Bid
    35 bids

    Top encryption Community Articles