Cryptography jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,812 cryptography jobs found, pricing in USD

    Project name: Smart Card EMV / EMV ISO-7816 & Smart Card Java Card Software Engineer & Programming & Ecectronic Engineers & Microcontroller & Cryptography Look what I need : 1. PIN Project I need a Software with wich I can just read the PIN from a Smart Card ( a Bank Card ) wich can be a SDA or DDA card. Like everybody know, on the Chip & Pin cards or so called EMV Bank Cards the PIN it is on the Chip , the way to extract the PIN , I really don’t know it ! - I do have 2 Smart Card Readers/Writers and I do have a Software ( Java EMV Reader ) so I do know and understand some data from there… Notice: if somebody can provide a Software with which I can find out the PIN from a Bank SDA or DDA card ,the...

    $39104 (Avg Bid)
    $39104 Avg Bid
    4 bids

    Project name: Smart Card EMV / EMV ISO-7816 & Smart Card Java Card Software Engineer & Programming & Ecectronic Engineers & Microcontroller & Cryptography Look what I need : 1. PIN Project I need a Software with wich I can just read the PIN from a Smart Card ( a Bank Card ) wich can be a SDA or DDA card. Like everybody know, on the Chip & Pin cards or so called EMV Bank Cards the PIN it is on the Chip , the way to extract the PIN , I really don’t know it ! - I do have 2 Smart Card Readers/Writers and I do have a Software ( Java EMV Reader ) so I do know and understand some data from there… Notice: if somebody can provide a Software with which I can find out the PIN from a Bank SDA or DDA card ,the s...

    $9776 (Avg Bid)
    $9776 Avg Bid
    1 bids

    Development of windows services application compatible with: Windows 7, Windows XP , Windows 2003/2008 (all service pack), Windows Vista. The following technologies will be used for the project: 1. .NET Delphi / Delphi 2009 or C# 2. XML; 3. Windows Services; 4. Windows Performance Monitor (not mandatory) 5. Windows Cryptography Providers We request: -. Source Code -. Executable file ready to install -. Copyright tansfer General Information The Windows services should be installed on all Windows OS version and starts automatically at boot; at regular intervals service reads the Local Windows Event Log for matching specific Event ID/User Name combination ( an xml configuration file will be described later). If there are new entries the service extracts data and ...

    $259 (Avg Bid)
    $259 Avg Bid
    9 bids

    Need Coder to develop software for opening *.rs and *.cer files This project can be done in any programming language. I am attaching files regarding the project (files which need to be opened and programs which use these files). Also i will enable direct access to server if you need to check some other things. Freelancer who will done this program must have good knowladge in Cryptography. On successful completion of the project freelancer will get a chance to work on another similar project.

    $500 (Avg Bid)
    $500 Avg Bid
    6 bids

    Please read the attached project description in detailed requirements. It relates to security principles such as encryption, PKI, cryptography etc ... Please note this is a writeup project not a coding project.

    $284 (Avg Bid)
    $284 Avg Bid
    5 bids

    ...that communicates with the main root server. -> Graphic user interface will be provided and a step by step guide in flow chart will be shown. Please bid for this project only if you know how to perform cryptography functions, such as using openssl libraries. All the encryption and decryption functions are provided at If you are comfortable or have worked on prior project that does the function from the above link, then you should find the project comfortably easy to manage. Let me know your background, whether you have cryptography, php, sql database knowledge. You should be familiar with the following subject fields: 1. RSA public and private key 2. .P12 and .pem file format 3. Hash function, ie. sha1() 4. Encryption and decryption

    $1246 (Avg Bid)
    $1246 Avg Bid
    6 bids

    I require a middleware application to act majorly as a message/transaction translator between various applications. This application requires expertise in Java and knowledge of encryption and decryption or simply say some level of understanding of cryptography. The first and primary function of this app is to receive XML formatted files and convert to ISO8583 standard language which involves conversion to and from hex to binary. I have sample codes to help with. This job has been done before but I need to extend it now but would need to developer to build his own from the scratch while I supply every needed information and examples and documentation relevant to do the work. There will be requirement for key exchange between 2 hosts and also PIN block encryption and decryption. ...

    $1025 (Avg Bid)
    $1025 Avg Bid
    2 bids

    We have a simple file format which is a zip file that contains, among other files, an xml file. This file needs to be digitally signed to detect tampering. The job is to create use C++ and a cryptography library to add digital signing to the file. ## Deliverables requirements notice: As originally posted, this project does not have complete details. Should a dispute arise and this project go into arbitration "as is", the contract's vagueness might cause it to be interpreted against you, even though you were acting in good-faith. So for your protection, if you are interested in this project, please work-out and document the requirements onsite.

    $110 (Avg Bid)
    $110 Avg Bid
    5 bids

    i am mtech final year student and this project is a part of my curriculum . the project is based on encryption and decryption techniques. an algorithm SRNN(short range natural numbers) has been described in the attached file which needs to be implemented with digital signature. the complete algorithm to be implemented has been algo is similar to RSA algo.

    $118 (Avg Bid)
    $118 Avg Bid
    5 bids

    Support development team with common programming and deployment tasks using Python as a base language. This project will last 1 month, so please bid for a 1 month period. Requirements: Skilled in Python 2.7 and basic Enhancement Proposals like PEP 8 ...Understanding of multi-threaded applications and synchronization techniques. Familiarity with Linux environment, including Apache. Understanding of Git and GitHub. Extra: PEP 8 and PEP 257 knowledge. Web Applications and HTTP protocol. Familiarity with WSGI frameworks. Asymmetric cryptography algorithms understanding. HTML5 and Jinja2 template system. Familiarity with iOS platform. Familiarity with unittest Python module. Skills Required: python, basic, linux, apache, git, github, cryptography, algorith...

    $2611 (Avg Bid)
    $2611 Avg Bid
    8 bids

    We are looking for a developer who is highly experienced with cryptography. Our application is a client/server model that needs to communicate offline with each other through binary files that require indentity verification and strong encryption. The implementation of this project will be simple for someone with the right skill set. The right candidate should also be able to advise us on which approaches to take and why. Please read the project first and write the word "Understood". Also write your steps and suggestions to complete the project with a short description of what you understood.

    $210 (Avg Bid)
    $210 Avg Bid
    5 bids

    i am looking to do a task so urgently on cryptography pls let me know if someone can do fast i am waiting for ur bid to decide as thisi s a small task

    $140 (Avg Bid)
    $140 Avg Bid
    2 bids

    i want to complete it pls let me know if u can do I can pay 30 for 3 parts altogether

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    i want to create project for MANET perfrom cryptography encryption and decryption using RSA algorithm routing using DSR algorithm and check for DOS attack

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    i want to communicate between mobile nodes and then apply denial of service attack on that

    $45 (Avg Bid)
    $45 Avg Bid
    2 bids

    Looking for someone to figure out the encryption and write a packet collector in C++ that will capture the packets while playing or read captured packets from a wireshark file and then output the decoded packets to a text file. Documention of the decryption process is required along with the source and the basics of the encryption used by the game would be game has a authenticati...sql backend may be offered. The name of the game and details of work that was done years ago will be provided over pm's. I'm re-listing since i never heard back from any of my replies. I don't think this will be a very difficult project for someone who has the know how or has previous experience. Please only inquire if you have previous experience with mmorpg's, reverse engineering an...

    $200 (Avg Bid)
    $200 Avg Bid
    2 bids

    I only have some knowledge in JAVA when it comes to programming, so I would like to have it written in JAVA language. Additional requirements not listed in the PDF file are as follows: 1. I only need to be able to use these characters: "A-Z", "a-z", "0-9". (Upper case letters, lower case letters, and numbers zero through nine. 2. In addition to those characters, we will be using only these special characters: period, question mark, comma, and space. So there are 66 characters max. (0-65) Attached is a pdf file of the assignment. (The assignment says to utilize division, but that part can be omitted.)

    $50 (Avg Bid)
    $50 Avg Bid
    1 bids

    I only have some knowledge in JAVA when it comes to programming, so I would like to have it written in JAVA language. Additional requirements not listed in the PDF file are as follows: 1. I only need to be able to use these characters: "A-Z", "a-z", "0-9". (Upper case letters, lower case letters, and numbers zero through nine. 2. In addition to those characters, we will be using only these special characters: period, question mark, comma, and space. Attached is a pdf file of the assignment. (The assignment says to utilize division, but that part can be omitted.)

    $278 (Avg Bid)
    $278 Avg Bid
    27 bids

    Question 1. Your duty for this assignment is to engineer a system that is going to be working for normal end users to access the system and save data in the system. Data access can be done remotely or locally. Please recall all the material about: - Cryptography - Identity verification - Access Control - Networking - And all else that we have spoken about In the scenario that you have to perform this assignment in I am nothing more than a client of yours. I have no knowledge about anything having to do with the actual engineering of IT systems be this software or hardware. All I have used in my life so far is Windows and barely any of its features. I know how to write a page in MS Word. I know how to use InetExplorer and access my Facebook account. I can barely send emails. I do how...

    $100 (Avg Bid)
    $100 Avg Bid
    1 bids

    Question 1. Your duty for this assignment is to engineer a system that is going to be working for normal end users to access the system and save data in the system. Data access can be done remotely or locally. Please recall all the material about: - Cryptography - Identity verification - Access Control - Networking - And all else that we have spoken about In the scenario that you have to perform this assignment in I am nothing more than a client of yours. I have no knowledge about anything having to do with the actual engineering of IT systems be this software or hardware. All I have used in my life so far is Windows and barely any of its features. I know how to write a page in MS Word. I know how to use InetExplorer and access my Facebook account. I can barely send emails. I do how...

    $1000 (Avg Bid)
    $1000 Avg Bid
    1 bids

    Question 1. Your duty for this assignment is to engineer a system that is going to be working for normal end users to access the system and save data in the system. Data access can be done remotely or locally. Please recall all the material about: - Cryptography - Identity verification - Access Control - Networking - And all else that we have spoken about In the scenario that you have to perform this assignment in I am nothing more than a client of yours. I have no knowledge about anything having to do with the actual engineering of IT systems be this software or hardware. All I have used in my life so far is Windows and barely any of its features. I know how to write a page in MS Word. I know how to use InetExplorer and access my Facebook account. I can barely send emails. I do how...

    $100 - $100
    $100 - $100
    0 bids

    Question 1. Your duty for this assignment is to engineer a system that is going to be working for normal end users to access the system and save data in the system. Data access can be done remotely or locally. Please recall all the material about: - Cryptography - Identity verification - Access Control - Networking - And all else that we have spoken about In the scenario that you have to perform this assignment in I am nothing more than a client of yours. I have no knowledge about anything having to do with the actual engineering of IT systems be this software or hardware. All I have used in my life so far is Windows and barely any of its features. I know how to write a page in MS Word. I know how to use InetExplorer and access my Facebook account. I can barely send emails. I do how...

    $100 - $100
    $100 - $100
    0 bids

    Question 1. Your duty for this assignment is to engineer a system that is going to be working for normal end users to access the system and save data in the system. Data access can be done remotely or locally. Please recall all the material about: - Cryptography - Identity verification - Access Control - Networking - And all else that we have spoken about In the scenario that you have to perform this assignment in I am nothing more than a client of yours. I have no knowledge about anything having to do with the actual engineering of IT systems be this software or hardware. All I have used in my life so far is Windows and barely any of its features. I know how to write a page in MS Word. I know how to use InetExplorer and access my Facebook account. I can barely send emails. I do how...

    $100 - $100
    $100 - $100
    0 bids

    Mostly adding features to existing open source code, possible merging with other open source technologies Python is mandatory, at least average understanding of c++ and cryptography.

    $7 / hr (Avg Bid)
    $7 / hr Avg Bid
    5 bids

    Your task is to build a flash game. The game will be played by 2 persons on a network with a browser on Android-based tablet that have Adobe Flash Player installed (it should playable in Windows / OSX / Linux too). Therefore the interface should be made to be touch friendly. The purpose of the game is to illustrate the working mechanism of "Quantum Cryptography". As a programmer you do not need to understand that. I will explain the mechanism of the game. Please download the attachments to see my crude sample illustrations and follow the description. Criteria for awarding: 1. My budget is only around $150 2. It needs to be done by 11pm (GMT+8) on 13 February 2012 3. Please submit a mockup of proposed game screen so that I can judge your design skill 4. Your st...

    $156 (Avg Bid)
    $156 Avg Bid
    3 bids

    I need a message serializer for wcf that I can add at the WCF endpoint. The message serializer will be an endpoint behavior that I add to a wcf endpoint and specify a key used for encryption. Each message will be serialized to an encrypted byte stream. The encryption mechanism should leverage enterprise library cryptography application block.

    $200 (Avg Bid)
    $200 Avg Bid
    5 bids

    ...like to change: 1. Change "Gary Oldman" to "Artur Ekert" 2. Change the title to "TINKER DIVER PILOT HACKER", but keep the "I" in the "DIVER" to be the chess piece (as in the the original poster). 3. Remove the list of the six names below the title (e.g. Benedict Cumberbatch, etc) 4. Change the last red line "Based on the JOHN..." to "Based on the life of Artur Ekert that redefined Quantum Cryptography. A poster by Centre for Quantum Technologies". Notes: 1. This project is for my own personal use (I'll print it myself in A3). 2. Bidder should be able to complete the work by 12 February 2012. 3. Before you start working on the detail, please post me the draft so that we are on the same page with...

    $68 (Avg Bid)
    $68 Avg Bid
    13 bids

    ...like to change: 1. Change "Gary Oldman" to "Artur Ekert" 2. Change the title to "TINKER DIVER PILOT HACKER", but keep the "I" in the "DIVER" to be the chess piece (as in the the original poster). 3. Remove the list of the six names below the title (e.g. Benedict Cumberbatch, etc) 4. Change the last red line "Based on the JOHN..." to "Based on the life of Artur Ekert that redefined Quantum Cryptography. A poster by Centre for Quantum Technologies". Notes: 1. This project is for my own personal use (I'll print it myself in A3). 2. Bidder should be able to complete the work by 12 February 2012. 3. Before you start working on the detail, please post me the draft so that we are on the same page with...

    $48 (Avg Bid)
    $48 Avg Bid
    28 bids

    Project Description: Need an ALREADY made software to decode .wav file to track 2 No need any hardware any Digital MP3 recorder can be used. I have tried already almost all software available over the net inculding DTMF Decoder. Software must be able to decode a WAV or mp3 file The sound in the wav file is magnetic stripe. If you can do this, So basicly I need a tool that will...So basicly I need a tool that will decode magnetic stripe audio sound into a text (numbers ) . The tool must be able to clear the noise in the sound and support interrupted data signal inside of sound file !! . the sound contains a data from track2 which will look like this 4678980970970989861276=87687698769876987698? Skills required: C Programming, C# Programming, C++ Programming, Crypto...

    $1400 (Avg Bid)
    $1400 Avg Bid
    1 bids

    A Windows Dll implementing a deciphering function is needed. ## Deliverables **Context:** A sender S sends data to a receiver R. The data consists of a value V (24 bytes) and an authentication code A (48 bytes). The authentication code A is the ciphering of V using the Elliptic Curve Cryptography algorithm (ECC). The parameters of the ECC are defined by the curve secp192r1. Public key and test vectors are provided as a separate file The authentication code (r,s) is formed as follows: r: bytes 0-23 of A, s: bytes 24-47 of A. The receiver R, has to check the authentication code A of the received data. **We need:** For the authentication code checking we need a Windows Dll with the following function: BOOL ECCCheck(char *PublicKey,...

    $300 (Avg Bid)
    $300 Avg Bid
    1 bids

    long term employment projects negotiated through PM-s, payment after completion of each project GUI creation, genetic alg, scripting, cryptography, website building and all the good stuff :)

    $5 / hr (Avg Bid)
    $5 / hr Avg Bid
    33 bids

    Hello, We are fellow web developers and need some help finishing an API site...so we need to add a good technical coder to help finish a project. Specifically experience with Oauth protocols or cryptography domain. Is this you? Thank You

    $250 - $750
    $250 - $750
    0 bids

    ...is written in ASP.Net (VB) framework 3.5 with MySQL as database. The very first task is to break into the system through the online login page. I would like you to break into it and find potential security loop holes which will allow me to create a more secure application. The second task would be then to test different features of the website and find bugs. Some one good with cryptography (md5), sql injection, asp.net session, writing queries, quality assurance engineering background will be best for this project. Let me just brief you about the first task (breaking into system): - The username and password first are validated with replacing single quotes (') with double quotes ("") - The password is saved as hash value in the db and the p...

    PHP
    $260 (Avg Bid)
    $260 Avg Bid
    2 bids

    I am looking to hire a content writer that knows about information security, ethical hacking / penetration testing, secure development, cryptography, cyber crime, etc. - MUST be 100% original content - MUST be grammatically correct and checked for spelling errors - MUST be from the US (no exceptions) Pay could be per article or for a batch. This could be on-going or you could just write one or several articles. Up to you.

    $68 (Avg Bid)
    $68 Avg Bid
    14 bids

    Hello, We are fellow web developers and need some help finishing an API site...so we need to add a good techinical coder to help finish a project. Specifically experience with Oauth protocols or cryptography domain. Is this you? Thank You

    $708 (Avg Bid)
    $708 Avg Bid
    6 bids

    I need an algorithm in php that generates keys for my software and writes the key to the database as well. The key should be 'irreversible' so the inputted data should be completely hidden. Please only submit a bid if you have a working knowledge about cryptography. A simple xor, and, or and not algorithm will not be accepted. The variables you get as input are: Registers name, purchase date, reseller name and country. There is one constant value that is the companies name. Should be easy if you have a working knowledge of cryptography (2~3 hours work). The output must be in the following format: But one that will actually result in a code in the format: sDi-qXL-EJw-U47 Or in regex: (w{3}-){3}wd{2}

    $16 / hr (Avg Bid)
    $16 / hr Avg Bid
    8 bids

    **Objective** The "Secrets Project" aims at developing a simple web-based system for managing an small organization's "secrets" (sensitive information, such ...Commented C# source code (Visual Studio Solution, along with its projects and references); - Published application release (web application files and initial SQL Server database); - Installation instructions (should be very simple: (1) create IIS application, (2) attach a SQL Server database, and (3) fill the database connection parameters within a settings file); - Instructions on where the cryptography key is stored, how to change it and how to keep it safe. - Instructions on how to configure ActiveDirectory integration; - Instructions on how to translate de application; - Instructions on how...

    $1142 (Avg Bid)
    $1142 Avg Bid
    10 bids

    Hi, I need URGENT HELP in doing Assignment based on Computer Security and C++ to be completed in 2-3 days time. The main purpose of this lab is for you to gain hands-on experience with public key cryptography algorithms, in particular RSA cryptosystems. A generalization of the standard two-prime RSA is ‘multi-prime RSA’ in which modulus contains more than two primes. Encryption, decryption, signature generation and verification in multi-prime RSA are similar to that of two prime RSA; however computational costs of decryption and signature generation can be lowered if the Chinese Remainder Theorem (CRT) is used (you are not expected to implement CRT for this lab) If you are sure that you can help me in this deadline then please contact me asap and i will give ...

    $107 (Avg Bid)
    $107 Avg Bid
    3 bids

    Hi, I need URGENT HELP in doing Assignment based on Computer Security and C++ to be completed in 2-3 days time. The main purpose of this lab is for you to gain hands-on experience with public key cryptography algorithms, in particular RSA cryptosystems. A generalization of the standard two-prime RSA is ‘multi-prime RSA’ in which modulus contains more than two primes. Encryption, decryption, signature generation and verification in multi-prime RSA are similar to that of two prime RSA; however computational costs of decryption and signature generation can be lowered if the Chinese Remainder Theorem (CRT) is used (you are not expected to implement CRT for this lab) If you are sure that you can help me in this deadline then please contact me asap and i will give ...

    $53 (Avg Bid)
    $53 Avg Bid
    5 bids

    Hi, There is a sentence at the beginning of the document. It says "Find the solutions of following questions(or solve them, it is up to you). Then prepare a report thatcompares this solutions with the solutions of your real homework." I'll make the second part. I need your help for only the first part. So, I need the solutions of the questions. It says "Find the solutions of following questions" but I could not find them with an internet search.

    $25 - $30
    $25 - $30
    0 bids

    Hi, There is a sentence at the beginning of the document. It says "Find the solutions of following questions(or solve them, it is up to you). Then prepare a report thatcompares this solutions with the solutions of your real homework." I'll make the second part. I need your help for only the first part. So, I need the solutions of the questions. It says "Find the solutions of following questions" but I could not find them with an internet search.

    $25 - $30
    $25 - $30
    0 bids

    I read at your resume and note that you uses Android and cryptography. I have 10 games that make it in Adobe Flash, and we want to post it over Android Store and Mac Store. At Mac Store, we are having error to upload it due to bad security signature and never they can be uploaded to the store, they run correctly over our Ipad and Ipod. The thing is just tell me whats wrong with my Mac configuration, help me to upload the games correctly and help me to post the same games at Android Store. I can pay to you 250 USD for that work. Are you interested?

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    Write c# code in silverlight that encrypts data and write python code that decrypts the data; use AES cryptography. If I encrypt 'Hello World', I want to get 'Hello World' when I decrypt it again. For the python code you must only use the Pycrypto library.

    $17 (Avg Bid)
    $17 Avg Bid
    1 bids

    Write c# code in silverlight that encrypts data and write python code that decrypts the data; use AES cryptography. If I encrypt 'Hello World', I want to get 'Hello World' when I decrypt it again. For the python code you must only use the Pycrypto library.

    $13 (Avg Bid)
    $13 Avg Bid
    4 bids

    The task is to port the original project (developed in C++) to pure Ansi C. This will require familiarity with certain cryptography concepts, peer-to-peer programming, multi-threading, and a number of C++ libraries (e.g. Boost) as more than 50% of the code comprise of libraries. Only Ansi C compliant libraries can be used in the target project and all libraries must be open source. Required completion time is 30 days max. The project is purely for academic purposes and there are no commercial interests. Feel free to ask questions if interested.

    $1500 (Avg Bid)
    $1500 Avg Bid
    2 bids

    The task is to port the original project (developed in C++) to pure Ansi C. This will require familiarity with certain cryptography concepts, peer-to-peer programming, multi-threading, and a number of C++ libraries (e.g. Boost) as more than 50% of the code comprise of libraries. Only Ansi C compliant libraries can be used in the target project and all libraries must be open source. Required completion time is 40 days max. The project is purely for academic purposes and there are no commercial interests. Feel free to ask questions if interested.

    $1965 (Avg Bid)
    $1965 Avg Bid
    10 bids

    This is an academic project (Msc) meant to improve on the speed of Plantard et. al., 2009 (Improvement of lattice-based cryptography using CRT). The project is to be able to encrypt and decrypt, and the coding should be done in J2EE. I need the project details in pdf, algorithm used, and the executable source code.

    $200 (Avg Bid)
    $200 Avg Bid
    6 bids

    Top cryptography Community Articles