Rijndael aes jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,000 rijndael aes jobs found, pricing in SGD

    I'm seeking expert to assist in configuring a Site-to-Site VPN on my Zyxel USG Flex 50, ensuring secure and reliable communication between our networks. Key Tasks: - connect to a already existing site - configure usg flex to not use dhcp and other option. just need vpn. i have a box behind Ideal Skills and Experience: - Proficient with Zyxel USG series - experience in VPN connection

    $203 (Avg Bid)
    $203 Avg Bid
    9 bids

    Hey you! Do you have more than 6 years as a Laravel Developer? Can you prove it? Can you prove/provide evidence of what you have personally done as a developer? Does compliance to high security standards, encyption at rest, encryption in transit, AES 256, SHA 256 mean something to you? Are you willing to join an existing project? Are you willing to work for a flat monthly salary? Then this job may be for you. Our team is hard at work building a web application. We currently need an additional developer to assist with some key activities. You will be assigned duties by our Application Team Leader. Shoot us a quick message if interested. No agencies or middle men please.

    $9 / hr (Avg Bid)
    $9 / hr Avg Bid
    82 bids

    ...primary task is to implement encryption and decryption, along with compression and decompression, in the existing project. - Data: The encryption and decryption will primarily focus on text data. - Implementation: I specifically require the use of AES, Huffman, Inflate and Deflate, and GZIP mechanisms for the encryption and decryption process. Ideal Skills and Experience: - Extensive Experience: Strong experience with VB6, particularly in encryption, decryption, compression, and decompression. - Specific Knowledge: Proficiency in implementing AES, Huffman, Inflate and Deflate, and GZIP in VB6. - Industry Best Practices: Knowledge of encryption best practices and data protection standards. If you have expertise in VB6 and encryption/compression techniques, your bid will b...

    $74 (Avg Bid)
    $74 Avg Bid
    10 bids

    I'm looking for someone who has experience in AES encryption and is also familiar with ASP.Net MVC database connection string, I need a person who can encrypt my connection string and show me the right way to complete the function.

    $11 / hr (Avg Bid)
    $11 / hr Avg Bid
    22 bids

    ...WiFi router. It can maybe use a technology similar to Z Wave or Zigbee wireless technology, and maybe use a method like PairAsync for pairing or connecting. The app must have a high level of security using HTTP, SSL, TLS or similar, and must encrypt and decrypt all data during transit and at rest with advanced security features like LESC, and using systems such as, or similar to, FIPS 140-2 and AES-SHA256 cryptography. I would like to have copies of any written source code that is created by you or any details on the tech stack, SDK and APIs used. As the app could be using Bluetooth or BLE, I want users to be able to send and receive data without the requirement of having to prompt for, or give permission for, a “pairing” or “connecting” of devices each ti...

    $1201 (Avg Bid)
    $1201 Avg Bid
    50 bids

    ...and Social Security Numbers. - File Saving: After the blurring process, I don't want to affect original data. Therefore, the solution must create a separate PDF that hosts the redacted information. - Encryption: For even further data protection, the blurred PDF file has to be encrypted using the AES (Advanced Encryption Standard) method, ensuring optimal security. To be considered for this task, you should have: - Proven experience with data redaction or similar projects - Robust knowledge of AES encryption - A strong background in software development, specifically for privacy and security applications. The ultimate goal is to generate a tool that is user-friendly and efficient, delivering maximum data protection. An ideal freelancer for this job is rigorous, fam...

    $47 (Avg Bid)
    $47 Avg Bid
    13 bids

    Develop an app which resides and runs of a usb thumb drive. The app needs to launch automatically when the usb is inserted into the Windows computer. App should give a selection of Backup or Restore to the user...an OPTIONAL add on quote if encryption is required. More details on Encryption below: OPTIONAL QUOTE: Encryption has to be on the entire thumb drive level. As soon as thumb drive is inserted the first time, it has to ask user whether encryption is needed, if yes, it has to ask user to setup a strong key/password and encrypt the disk according to any standard FIPS approved encryption standards (AES preferred). Whenever the thumb drive is used subsequently, it has to prompt user to enter the password to unlock the drive and the app before continuing with backup/restor...

    $1038 (Avg Bid)
    $1038 Avg Bid
    12 bids

    ...developing encryption, decryption, and key generation functionalities. Key Project Requirements: - Extensive knowledge and application of Cryptography - Proficiency in the C programming language - Experience in generating SHA keys The Cryptographer will perform the following tasks: 1. Encryption and Decryption: You will write code that facilitates both encryption and decryption processes using the AES (Advanced Encryption Standard) algorithm. 2. Key Generation: Involves the creation of a safe and secure key generation mechanism utilizing SHA. You should prioritize key security to guarantee the confidentiality and integrity of the encrypted contents. 3. File Support: The coded software should accept file inputs only, handling and processing encryption and decryption request...

    $23 (Avg Bid)
    $23 Avg Bid
    3 bids

    As an expert in Google Cloud services and security configurations, you'll be tasked to: - Set up a Load Balancer on Google Cloud Engine for a Google App Engine project in a two-hour live session via Google Meet with screen...Set up a Load Balancer on Google Cloud Engine for a Google App Engine project in a two-hour live session via Google Meet with screen sharing. - The main goal is to increase the security of the site. - You're expected to disable TLS 1.0 and 1.1 protocols, and enable both TLS 1.2 and TLS 1.3 versions in the project for optimal security. - Also, certain encryption algorithms, specifically RSA, AES 128, AES 256, CBC and GCM need to be disabled. The ideal candidate must have extensive experience with GCE and advanced understanding of TLS protocols...

    $71 (Avg Bid)
    $71 Avg Bid
    4 bids

    I need a custom code component created for my PowerApps Canvas App. Key Requirements: - The component should decrypt static text encrypted with AES or any other simple algorithm Deadline: - I need this project completed ASAP. Ideal Skills and Experience for the Job: - Strong experience with C# programming, Java script or any language that we will use to achieve the goal - Prior experience with creating code components for PowerApps Canvas Apps. - Proficiency in encryption/decryption methods

    $221 (Avg Bid)
    $221 Avg Bid
    39 bids

    I'm seeking an ethical hacker to help me enhance the security of my website. Key Requirements: - Identify vulnerabilities in the current system - Encrypt the website's hash data effectively using a secure algorithm - Provide ongoing support...my website. Key Requirements: - Identify vulnerabilities in the current system - Encrypt the website's hash data effectively using a secure algorithm - Provide ongoing support to ensure the system remains secure Ideal Skills: - Proficiency in ethical hacking - Experience with encryption algorithms (knowledge of AES, RSA, Blowfish is a plus) - Strong problem-solving and analytical skills - Excellent communication and collaboration abilities Please note, the key size for the AES encryption algorithm will need to be det...

    $478 (Avg Bid)
    $478 Avg Bid
    13 bids

    I'm seeking an expert who can decrypt an AES encrypted .cap file. The file contains encrypted data I need to access for educational purposes. Key requirements include: - Expertise in decrypting AES encrypted files - Ability to efficiently and securely recover the data from the .cap file - Strong commitment to data privacy and confidentiality Please provide examples of similar work you have done in the past, and outline your proposed approach to this task.

    $24 / hr (Avg Bid)
    $24 / hr Avg Bid
    15 bids

    ..."X", you might append ".bwf" or another unique extension to the encrypted files. 5. Ensure that your decryption process accurately recovers the original file, including its correct extension. The decrypted file should be identical to the original input file in every aspect. Topics for Approach 1: Implementation of one of the below algorithms Implementation of DES (Data Encryption Standard) AES (Advanced Encryption Standard) Camellia Blowfish Twofish RC4 (Rivest Cipher 4) Serpent CAST-128/CAST-256 Project Guidelines: 1. Proposal Submission: o ● Submit a proposal outlining the chosen approach and topic. o ● Include a brief description of the methodology for Approach 1 or the selected 2. Research Phase: o ● Approach 1: Conduct research on t...

    $158 (Avg Bid)
    $158 Avg Bid
    43 bids

    I am currently seeking an experienced AES cyber security professional. Project Summary: - Implementation of Encryption Algorithm: a) Develop an implementation scenario for one encryption algorithm. b) Provide a detailed description of the chosen algorithm, including its functioning. c) Apply software engineering approaches, starting from requirements gathering to design and implementation phases. d) Submit a complete project package containing: • The implemented encryption algorithm. • Detailed documentation of the algorithm and project development process. • A graphical interface for file encryption and decryption. • Important Implementation Tips: In your implementation, please adhere to the following guidelines: 1. Your program should accept any file type as ...

    $178 (Avg Bid)
    $178 Avg Bid
    49 bids

    I'm seeking an expert in Python to develop a decryption utility tool. The purpose of this tool is to decode encrypted messages, binary files, and encoded data, helping me simplify and expedite data analysis tasks. The ideal candidate will: • Have substantial experience with Python programming. • Be familiar with various encryption algorithms, notably AES, RSA and DES. Your expertise in these will be key to the successful creation of this utility. • Be committed and focused, as the tool must be completed ASAP. Looking forward to receiving bids from suitable and interested freelancers. Please, when bidding, include any relevant experience and examples of similar projects.

    $28 (Avg Bid)
    $28 Avg Bid
    76 bids

    ...users on HIPAA regulations and compliance requirements and ensure ongoing compliance through regular audits and monitoring. Technologies: - Frontend: HTML5, CSS3, JavaScript (React.js for web, React Native for mobile) - Backend: Node.js, , MongoDB (or other suitable database) - Authentication: JWT (JSON Web Tokens) with secure storage and handling of authentication tokens - Encryption: AES encryption for data at rest and TLS encryption for data in transit - Audit Trails: Implement logging mechanisms to capture user activities and system events for audit purposes - Compliance Tools: Utilize HIPAA compliance management tools for risk assessment, policy management, and compliance monitoring Deliverables: - Fully functional web-based LMS accessible via web browsers and a mobile app...

    $20784 (Avg Bid)
    Urgent
    $20784 Avg Bid
    143 bids

    ...pace of development. Key requirements include: - Proficient in the use of NTAG 424 DNA for mutual authentication -' SUN, AES,CMAC, dynamic authentication, mutual authentication' How they work. - Proficient in making native app on NFCs. - Familiar with programming and product authentication methods - Comprehensive knowledge in front-end, backend and database so, in short, i want to make a cross-platform anti-counterfeiting app using NFC (ntag424 dna) . which the user is going to scan the tag with the app it's going to verify it with the database. then show them the UI as per you familiar with these kinds of platforms and the ntag 424 DNA (SUN, AES,CMAC)? i will welcome any suggestion or recommendation from your side too. Better ideas are also welcome...

    $597 (Avg Bid)
    $597 Avg Bid
    5 bids

    ...need an expert to implement advanced AES-256 bit security encryption for an SQLite database in a Windows application using VB.Net. This task requires specific expertise in working with encryption to secure private data. Key Requirements: - Proficiency in VB.Net - Deep understanding of AES-256 bit encryption - Familiarity with SQLite databases - Prior experience in data encryption The encrypted SQLite database will become a storage unit for personal identifiable information. This sensitive data demands high security measures, thus professional handling is crucial for the success of this project. The completed task should ensure maximum protection against unauthorized access and reliably shield the stored personal data. Main Task: - Implement advanced AES-256 bi...

    $81 (Avg Bid)
    $81 Avg Bid
    2 bids

    I am in need of a compelling sales pitch for our IT services, specifically targeting large corporations. The sales pitch should prominently feature two of my main services: Active Directory Migrations, Consolidations, and On-prem migration to Azure AD. Key Benefits to Highlight: - Significant cost savings - Over 14 years of experience in providing top-tier IT services to some ...- Over 14 years of experience in providing top-tier IT services to some of America's largest companies Ideal Skills and Experience: - Significant knowledge in IT sector - Proven experience in sales pitch creation - Understanding of large business requirements - Familiarity with Azure AD and Active Directory. Previous Projects: Ascension Health domain Community Health Hospital Rockwest Bedrock AES P...

    $210 (Avg Bid)
    $210 Avg Bid
    8 bids

    Need a cyber security specialist to decrypt an AES-CTR encryption for a CTF flag. provided information : pcapng file for wireshark and the encryption method written in python

    $32 (Avg Bid)
    $32 Avg Bid
    6 bids

    ...The design of the client should be user-friendly, making it easy to traverse and understand. - High performance and stability: Despite its ease of use and setup, the client should not compromise on performance or stability. - The client interface needs the following features: "Connect", "Disconnect", and "Import Config" buttons. Clicking "Import Config" imports a configuration file encrypted with AES-256. The configuration file contains the server IP address, port number, virtual HUB name, username, and password. After importing the configuration file, VPN connections can be made by clicking connect and disconnect. Use direct TCP/IP connections, with an automatic reconnection interval of 15 seconds, always keeping the VPN online. The offici...

    $191 (Avg Bid)
    $191 Avg Bid
    4 bids

    I'm currently seeking a skilled Python developer, specifically with expertise in Cyber security, to address a critical data encryption issue in our corporate network. The ideal candidate should be proficient in: - Cybersecurity measures and protocols - Data encryption - Python Programming The task at hand: - Implement AES-128 encryption using Galois-Field multiplication without any external libraries Experience in using Python for data encryption in a corporate setting is strongly preferred. The goal is to ensure the enhancement of the network's security and the integrity of our corporate data. Strong communication skills are a must, as the selected candidate might need to explain complex cybersecurity concepts to the in-house team.

    $35 (Avg Bid)
    $35 Avg Bid
    6 bids

    ...PHP pages to develop not to mention two CSS HTML pages to parse for output. The chosen platform for this project is WYSIWYG Web Builder v19, and may utilize it's own controls and CSS imports with exception of a login page necessary to authenticate users and establish a timed session, resulting in cookie session management, utilizing AES for obfuscation. **Key Requirements:** - **E-commerce Functionality:** The site will utilize user authentication via PHP & AES, through; File IO. - **Payment Gateway Integration:** Implement Clover as the primary payment solution, ensuring secure and efficient transaction processing. - **User Experience:** Maximal visibility & archived changes, as well as seamless work flow, are preferable. - **Responsive Design:** The websit...

    $2178 (Avg Bid)
    $2178 Avg Bid
    257 bids

    I'm on the lookout for a skilled freelancer who can implement AES encryption and decryption for text inputs efficiently. My project involves securing sensitive information through encryption and ensuring it can be decrypted back into its original format. Here's what I'm looking for: - **Strong Understanding of AES**: Proficiency in the Advanced Encryption Standard (AES) is a must. You should have a robust grasp of its workings, strengths, and how to implement it securely. - **Encryption/Decryption of Text**: The core task involves encrypting plain text and decrypting it back to its original state. Hence, experience with handling and manipulating text data is crucial. - **Security Best Practices**: Knowledge of security measures and best practices in e...

    $28 (Avg Bid)
    $28 Avg Bid
    8 bids

    I need a cryptologist -programmer Library (algorithm): Argon2id, AES, RSA Programming language: Java, and your own choice for implementing the Rest API Sweeps work: The goal of this work is to create a software component that will store and securely exchange secret data, such as symmetric encryption keys, with other components. When developing this solution, the zero trust principle should be adopted, and the need to create secure copies of stored information should be taken into account. The correct functioning of the component must be demonstrated by testing Work plan: 1. principles of secure software development 2. authentication, authorization, cryptographic mechanisms 3. principles of implementing secure software 4. Security Testing The methodology will reset in the corresponde...

    $233 (Avg Bid)
    $233 Avg Bid
    10 bids

    ...In parallel, our Content Management and Brand Managers teams are considering working with CRM Products and Content Groups in Promomats in the digital materials like AE and CLMs. This information is key from Commercial and Compliance point of view and must be integrated with Veeva CRM. This has to be tested in Sandbox before we move it to Business considers this information of the CLMs and AEs used and shown by the MSL and Sales Reps in the field very important. They want to capture this in the PowerBI report that is being built. Exercises: i Please, provide a technical proposal solution to solve this gap between systems. ii How can we setup this functionality? How can we ensure this information is integrated in the CRM and how we shown this in the CRM? iii Provide two ways to ...

    $341 (Avg Bid)
    $341 Avg Bid
    8 bids

    ...In parallel, our Content Management and Brand Managers teams are considering working with CRM Products and Content Groups in Promomats in the digital materials like AE and CLMs. This information is key from Commercial and Compliance point of view and must be integrated with Veeva CRM. This has to be tested in Sandbox before we move it to Business considers this information of the CLMs and AEs used and shown by the MSL and Sales Reps in the field very important. They want to capture this in the PowerBI report that is being built. Exercises: i Please, provide a technical proposal solution to solve this gap between systems. ii How can we setup this functionality? How can we ensure this information is integrated in the CRM and how we shown this in the CRM? iii Provide two ways t...

    $271 (Avg Bid)
    $271 Avg Bid
    9 bids

    ...requirements: - **Core Focus:** Integrate steganography into text, images, and video files using Java. - **Steganography Techniques:** - Implement Discrete Cosine Transform (DCT) - Integrate Discrete Wavelet Transform (DWT) - **Encryption:** - Use AES encryption algorithms - Ensure a low level of security for keys (sufficient for basic protection) The ideal freelancer will have: - Proficiency in Java programming (primary language) - Experience with cryptographic techniques - Understanding of DCT and DWT steganography methods - Knowledge of AES algorithms and key management The project is quite demanding; thus, it's pivotal that the freelancer demonstrates a strong portfolio which encompasses similar security-focused tasks. Above all else, creativity an...

    $36 (Avg Bid)
    $36 Avg Bid
    3 bids

    I need a skilled developer to create a steganography application tailored to my specifications. My key requirements include: - Development for a Windows environment. - Capability to embed text within images. - Use of AES for intermediate encryption level. Ideal skills for this project: - Proficient in cryptography and encryption algorithms. - Experienced with image processing. - Strong background in Windows application development. - Familiar with steganography techniques. Experience with the following is a plus: - Knowledge of AES encryption standards. - Past projects involving steganographic practices. I'm looking for someone who can deliver a secure, user-friendly application with a focus on confidentiality. Your expertise will help ensure that the text remains hi...

    $152 (Avg Bid)
    $152 Avg Bid
    4 bids

    ...protection, secure transactions, and protection of sensitive information. Core project deliverables entail: • Ensuring SSL (Secure Sockets Layer) and AES (Advanced Encryption Standard) encryption methods are applied across the platform. • Implementing robust safeguards to protect customer data, secure online transactions, and preserve sensitive information, including banking details, ownership data, and server information. • Integrating various payment gateways into the platform, including PayPal, Stripe, and a direct bank API gateway. Prior experience in designing encrypted ecommerce websites is crucial, alongside proficiency in SSL, AES, and various payment gateway integrations. The ideal candidate should demonstrate a clear understanding of advanced enc...

    $1030 (Avg Bid)
    $1030 Avg Bid
    151 bids

    I'm seeking a skilled Java Swing develope...connection must contain the following details: DataBaseName, Host, Port, User, and Password. - Database Compatibility: You should ensure compatibility with MySQL, Oracle, and PostgreSQL databases as the specific database type may vary. - Encryption: All passwords must be encrypted using AES encryption for security purposes. - Display: Upon launch, these connections should be displayed in a Swing JList. - Skills and Experience: The ideal candidate definitely needs substantial experience with Java Swing, AES encryption, and managing database connections. Your demonstration of past work will be an added advantage. Please remember to highlight in your application, your experience in the key areas detailed above. I look forward ...

    $233 (Avg Bid)
    $233 Avg Bid
    6 bids

    I'm seeking a highly skilled Verilog engineer to design and implement an AES encryption and decryption system. This project has been initiated with the purpose of ensuring data security and as such, the successful applicant must be experienced in the field of cryptography. Proficiency in Verilog and a clear knowledge of encryption methods, particularly AES, are crucial for the success of this project. In your application, kindly provide: - Details of your past experiences related to Verilog - Any relevant project proposals you've worked on, showcasing your proficiency in developing AES systems. The deadline for completion of the project will be within one month. Please keep this timeframe in mind as you consider your application and potential schedule. I...

    $526 (Avg Bid)
    $526 Avg Bid
    8 bids

    I...system and a Windows client application, both developed using C#. The communication between these two platforms should be enabled through binary messages in CBOR format. Key considerations include: - Operating Systems: The candidate should be familiar with both Linux and Windows as the kestrel server is needed on Linux, and the client will be on Windows. - Encryption: We will be using keyed HMAC, AES-256, ECDSA, and ECDH for data security. An understanding of these encryption methodologies is necessary. - Programming: The project heavily relies on C#/.NET, so high proficiency is required. Expected candidates need to deliver secure and efficient solutions, demonstrating their competence in the above mentioned skills, particularly with binary communication and encryption meth...

    $1217 (Avg Bid)
    NDA
    $1217 Avg Bid
    26 bids

    About the Project: We're on the hunt for an enthusiastic and skilled d...An intuitive interface for managing scanned images, including options to delete and organize them. Efficient Folder Management: Users should be able to easily create and manage folders for their documents. Robust AES Encryption: Security is paramount. We're counting on you to implement top-notch AES 256 encryption for image storage. Smart Storage Management: Help our users keep their devices clutter-free with automatic local storage clearance after uploads. Your Technical Toolkit Should Include: A solid background in React Native and TypeScript. Hands-on experience with AES encryption in mobile apps. Proven skills in API integration and data management. A good grasp of SSO login me...

    $614 (Avg Bid)
    $614 Avg Bid
    19 bids

    Hi Romeo. You started solving a Crypto CTF. I think I have the last piece we need to solve it: the name of the file. It have the lenght of a 128 aes key or iv (and hexadecimal characters). I hire you in order to finish the project.

    $297 (Avg Bid)
    $297 Avg Bid
    1 bids

    I have 2 aes encryption functions for a mobile app done with pointycastle which are running slow. I need someone to convert them to as its faster.

    $1098 (Avg Bid)
    $1098 Avg Bid
    66 bids

    I am in need of a specialist who can generate an RSA key with OAEP SHA1 padding. generate RSA key with a OAEP sha1 padding and fix error {"response_code":"36","response_description":"AES Decryption failed","error_details":"error:0607A082:digital envelope routines:EVP_CIPHER_CTX_set_key_length:invalid key length"}

    $206 (Avg Bid)
    $206 Avg Bid
    23 bids

    I have 2 aes encryption functions for a mobile app done with pointycastle which are running slow. I need someone to convert them to as its faster.

    $1147 (Avg Bid)
    $1147 Avg Bid
    92 bids

    I have a react native app created for Android and we are facing some problem while trying to build and deploy on Google Pay Store using AES. App is tested using Expo Go on mobile it works fine. First Task: = Deploy it on Google Play Store. Next Tasks which may come for future are. - Testing and Fixing if needed for iOS and deploy there. - We may need to add new features to it. We don't want developers from India and Pakistan. We wan some one who has deployed the expo react native app using AES Google Play Store and iPhone Store.

    $16 / hr (Avg Bid)
    $16 / hr Avg Bid
    22 bids

    Hi, I have a new company and looking for a very basic logo, Company name is "All Equipment Solutions" Looking for a logo that says "AES" In black bordered letters with a thinner line of green inside the boarder, Maybe fully underlined by "All Equipment Solutions" if its readable. COLOURS green, black and white only NO gears or spanners or cars etc, just writing.

    $22 (Avg Bid)
    Guaranteed
    $22
    357 entries

    Examsoft Decryptor Project Skills and Experience: - Expertise in decryption software - Proficiency in AES-256 encryption - Experience with Examsoft software - Knowledge of file formats, particularly PDF conversion Project Description: We are seeking a skilled freelancer with experience in decrypting Examsoft software files. The ideal candidate should possess expertise in AES-256 encryption and have prior experience working with Examsoft software. The main objective of this project is to decrypt an Examsoft file, specifically in PDF format. The decrypted file should retain its original formatting and content. Successful freelancers should include their experience in their application, showcasing past work and detailed project proposals. They should demonstrate their prof...

    $176 (Avg Bid)
    $176 Avg Bid
    17 bids

    ... (log in with google is already configured) - This ^ may be part of a separate custom plugin or make use of an existing (high quality preferably free or low cost plugin) Security / Maintenance requirements: - Maintain secure connection (SSH already configured on the site) - Use secure api connections wherever possible. - Encrypt any sensitive user data at rest using industry standards (like AES-256) - Input Validation and Sanitization: The plugin should validate and sanitize user inputs to prevent SQL injection, cross-site scripting (XSS), and other common web vulnerabilities. - In the future, we'll need to perform regular Security Audits and Updates as needed to address bugs or vulnerabilities. - Error Handling: The system should handle errors without exposing sensiti...

    $4040 - $6734
    Featured Sealed
    $4040 - $6734
    28 bids

    ...encrypted payload and decrypting it Here are some input examples: 00004020720205100801 00014979120235100017 00006885320195230026 Programming Language: JavaScript - The API should be developed using JavaScript. Encryption Algorithm: AES - The API should use the AES encryption algorithm for encrypting and decrypting payloads. Expected Volume: High - The API should be able to handle a high volume of payloads that need to be encrypted and decrypted. Skills and Experience: - Strong proficiency in JavaScript programming. - Experience with encryption algorithms, particularly AES. - Knowledge of web APIs and how to integrate them into applications. - Ability to handle high volumes of data efficiently. - Strong problem-solving skills. - Good communication and collaborat...

    $213 (Avg Bid)
    $213 Avg Bid
    10 bids

    I am looking for an intermediate level freelancer to create a written documentation tutorial on cyber security. The tutorial should cover topics such as AES, SHA-256, Diffie-Hellman, PS, and TLS. The ideal freelancer for this project should have a strong understanding of cyber security concepts and be able to explain them in a clear and concise manner. Specific requirements for the tutorial include: - Written Documentation: The tutorial should be in written format, providing step-by-step explanations and instructions. - Practical Exercises: The freelancer should include practical exercises to help the readers apply the concepts they have learned. These exercises should be relevant to real-world scenarios and provide hands-on experience. - Clear and Concise Language: The tutorial s...

    $257 (Avg Bid)
    $257 Avg Bid
    6 bids

    We had MySQL v5.7 and some tables of utf8_unicode_ci format encrypted with AES . However, recent version of MySQL is 8.0.2 and AES_DESCRYT function is not working for utf8_unicode_ci Example : SELECT AES_DECRYPT('|²Üì·Ê´†Õ-È¿S±', '24468414@Ab') AS decrypted_text; It works fine on Mysql V5.7, but not on 8.0.2.

    $18 (Avg Bid)
    $18 Avg Bid
    7 bids

    This is ongoing project. Backend API already completed To get access token by login, backend login api needs parameter - AES(("username:phone", key_string)) I tried to send encrypted string but failed to solve this issue, you should be expert in AES & Base64 function in flutter. This is not beginner's project Would you start your application with "AES & Base64" to show you read my post carefully. If you aren't experience in AES & Base64 function in flutter, don't bid If you fix this issue, I will hire you for long-term Kind regards

    $67 (Avg Bid)
    $67 Avg Bid
    14 bids

    I am looking for a PHP developer who can help me with a security improvement project for my PHP scri...my PHP script. The specific modifications needed include: - Implementing S3 storage encryption to enhance the security of the script - Ensuring that the encryption method used is strong and reliable, with a focus on data protection Ideal Skills and Experience: - Strong proficiency in PHP and experience with script modification - Knowledge and understanding of encryption methods, particularly AES encryption - Familiarity with S3 storage and encryption integration - Attention to detail and a strong focus on security best practices The timeline for completing this project is very important to me, so I am looking for a developer who can deliver the modifications within a specified ...

    $199 (Avg Bid)
    $199 Avg Bid
    22 bids

    ***PROJECT ONLY FOR EXPERIENCED DEVS*** Hello, I am looking for skilled programmers who can program LimeSDR Mini v2.2 . The goal is to make the LSM7002M pair with other LSM7002M and exchange data in the following ways: (I) Modulation – AM, FM, 4FSK (DMR) without AES (ii) AM, FM, 4FSK (DMR) with (AES 256 bits) (iii) Narrowband Waveform (25 kHz) for voice communication (iv) Data Rate atleast 1 Mbps for transfer of text messages,image transfer etc. (v) Interfacing the FPGA with external microcontroller (BL618/Equivalent). (vi) Making the FPGA getting into sleep mode during non operation and wake up on interupt from the external microcontroller. The FPGA will receive data from the external microcontroller which is linked with microphone,keypad & knob,camera.

    $462 (Avg Bid)
    $462 Avg Bid
    5 bids