As3crypto decryption 256 työt

Suodata

Viimeisimmät hakuni
Suodatusperuste:
Budjetti
asti
asti
asti
Tyyppi
Taidot
Kielet
    Työn tila
    2,000 as3crypto decryption 256 työtä löytyi, hinnoittelu EUR
    C# Component for PowerApps Canvas App 5 päivää left
    VARMENNETTU

    I need a custom code component created for my PowerApps Canvas App. Key Requirements: - The component should decrypt static text encrypted with AES or any other simple algorithm Deadline: - I need this project completed ASAP. Ideal Skills and Experience for the Job: - Strong experience with C# programming, Java script or any language that we will use to achieve the goal - Prior...- The component should decrypt static text encrypted with AES or any other simple algorithm Deadline: - I need this project completed ASAP. Ideal Skills and Experience for the Job: - Strong experience with C# programming, Java script or any language that we will use to achieve the goal - Prior experience with creating code components for PowerApps Canvas Apps. - Proficiency in encryption/decryption...

    €150 (Avg Bid)
    €150 Keskimäär. tarjous
    38 tarjoukset
    pixel art de escudo 8 päivää left

    hacer el escudo en 256 y otro de 128 pixel

    €39 (Avg Bid)
    €39 Keskimäär. tarjous
    1 tarjoukset

    I am looking for a Flutter developer to create a comprehensive PDF package (not APP). - The package should include functionality for: 1.) PDF encryption and decryption 2.) PDF compression 3.) Splitting PDF into multiple PDFs 4.) Merging multiple PDFs 5.) Watermarking PDF 6.) PDF validity and protection info 7.) Add page no. to the PDF 8.) Change PDF page size IMPORTANT: Do not use any underlying technology which requires AGPL-3.0 license or any other license which asks for fees for commercial use. Platform Support: - The Flutter package should be able to work seamlessly across both iOS and Android platforms. Exhaustive documentation will be required for the package. Example flutter package (for reference only): Payments will be done in phases

    €673 (Avg Bid)
    €673 Keskimäär. tarjous
    53 tarjoukset

    I need help recovering encrypted documents from my partially operational server. The server is currently inaccessible, but I have a complete backup of the affecte...recovering encrypted documents from my partially operational server. The server is currently inaccessible, but I have a complete backup of the affected files. The files are encrypted, and I need them recovered in their original format. Key Requirements: - Specialized in encrypted file recovery - Proficiency in data recovery from partially operational servers - Experience with document recovery and decryption It's important that the freelancer has the necessary skills and tools to recover the encrypted documents from my server without causing any further damage. The recovered files should be in their original, unco...

    €112 (Avg Bid)
    €112 Keskimäär. tarjous
    5 tarjoukset

    ...Bitcoin Libraries for Transaction Validation: You must not use any Bitcoin-specific libraries or frameworks that automate transaction validation processes. The intent of this task is for you to implement the validation logic manually. - Permissible Libraries: The use of standard cryptographic libraries, such as secp256k1 for elliptic curve cryptography, and standard hashing libraries (e.g., for SHA-256) is allowed and encouraged. These libraries are essential for implementing the cryptographic underpinnings of bitcoin without reinventing the wheel. - Implement the Mining Algorithm Yourself: You are required to implement the mining algorithm on your own. This includes creating a way to correctly form a block header, calculate the hash, and meet the task of finding a hash below a c...

    €10 (Avg Bid)
    €10 Keskimäär. tarjous
    3 tarjoukset

    I am in need of a professional who can assist me in unlocking and editing the text content of my PDF document. My project requirements in detail are: 1. **PDF Unlocking**: - Remove the password from my PDF to grant access for editing. 2. **Text Editing**: - Modify the existing text in the document. The changes to be made will be provided.Sw...PDF to grant access for editing. 2. **Text Editing**: - Modify the existing text in the document. The changes to be made will be daviradu with someone with a score of 220 The ideal freelancer for this project should be experienced with PDF editing tools, have a strong attention to detail and excellent command of the English language. Knowledge of various encryption and decryption techniques would be highly beneficial.

    €18 (Avg Bid)
    €18 Keskimäär. tarjous
    48 tarjoukset
    Log FIle Decryption Loppunut left

    I need to decrypt a crypted client-side log file (.txt) of a desktop application The goal is to understand the logic behind encryption and write a simple script that translates data in human-readable text. I have no idea on how encryption is made. The application has a client-server architecture, and could have restrictions based on user location. So, you will likely need to use a vpn or vps to test. Source code must be delivered at the end of contract, better if logic behind script is directly explained via call (not mandatory). Preferred language for scripts is p1ton (volutanry wrong to not received automated answers), but I am open to other language if there are clear benefits.

    €122 (Avg Bid)
    €122 Keskimäär. tarjous
    63 tarjoukset

    I am in urgent need of a decryptor tool to recover my files that have been encrypted by a virus. My all files are encrypted with ".mkp" Unfo...all files are encrypted with ".mkp" Unfortunately, I do not have any backups of these files, so the tool needs to be able to decrypt them directly. Key Requirements: - The tool must be compatible with Windows OS - It should be able to quickly and effectively decrypt files with the .mkp extension Experience Needed: - Proficiency in software development and security - Experience in creating decryption tools is highly preferred - Ability to work quickly and effectively to meet the immediate deadline Please only bid on this project if you are confident in your ability to meet these requirements and can deliver the tool w...

    €11 (Avg Bid)
    €11 Keskimäär. tarjous
    1 tarjoukset

    I'm seeking an expert who can decrypt an AES encrypted .cap file. The file contains encrypted data I need to access for educational purposes. Key requirements include: - Expertise in decrypting AES encrypted files - Ability to efficiently and securely recover the data from the .cap file - Strong commitment to data privacy and confidentiality Please provide examples of similar work you have done in the past, and outline your proposed approach to this task.

    €17 / hr (Avg Bid)
    €17 / hr Keskimäär. tarjous
    15 tarjoukset

    I am seeking an expert who can reverse engineer an APK file. the main idea is to know how to call the API from Postman as the API request has signature and the response is encrypted. the signature and the decryption happen inside the APK APK Link: This APK is coded in Java and your primary task will be to decipher the APK's code structure for a comprehensive understanding. Note that documentation is not required after reverse engineering. Experience in Java and advanced reverse engineering techniques are primary skills that you should possess. Good communication will be an important advantage because I might need to understand complex operations during the process. Thanks for considering this project.

    €440 (Avg Bid)
    €440 Keskimäär. tarjous
    66 tarjoukset

    I need someone to calculate and show me simply the difference between different computer systems: 1) standard 32 bit computer 2) standard 64 bit computer 3) 32 qubit quantum computer 4) standard 256 bit super computer 5) standard 1024 bit super computer 6) a hypothetical system that uses hex instead of bits I will give 2 simple calculations and i simply need to understand how many combinations ie how long it would take to perform simple calculations for each of the 6 systems. Will lead to more work

    €90 (Avg Bid)
    €90 Keskimäär. tarjous
    30 tarjoukset

    ...and project development process. • A graphical interface for file encryption and decryption. • Important Implementation Tips: In your implementation, please adhere to the following guidelines: 1. Your program should accept any file type as input (e.g., .docx, .jpg, .xlsx, etc.). 2. Depending on your chosen encryption algorithm, the program must split the input file into appropriate blocks for encryption. 3. Encrypt the file's extension and append it to the last block of encrypted data. 4. Add a new, algorithm-specific extension to the encrypted file. For example, if you use an algorithm named "X", you might append ".bwf" or another unique extension to the encrypted files. 5. Ensure that your decryption process accurately recovers t...

    €106 (Avg Bid)
    €106 Keskimäär. tarjous
    45 tarjoukset

    ...algorithm and project development process. • A graphical interface for file encryption and decryption. • Important Implementation Tips: In your implementation, please adhere to the following guidelines: 1. Your program should accept any file type as input (e.g., .docx, .jpg, .xlsx, etc.). 2. Depending on your chosen encryption algorithm, the program must split the input file into appropriate blocks for encryption. 3. Encrypt the file's extension and append it to the last block of encrypted data. 4. Add a new, algorithm-specific extension to the encrypted file. For example, if you use an algorithm named "X", you might append ".bwf" or another unique extension to the encrypted files. 5. Ensure that your decryption process accurately recover...

    €124 (Avg Bid)
    €124 Keskimäär. tarjous
    51 tarjoukset

    I'm seeking an expert in Python to develop a decryption utility tool. The purpose of this tool is to decode encrypted messages, binary files, and encoded data, helping me simplify and expedite data analysis tasks. The ideal candidate will: • Have substantial experience with Python programming. • Be familiar with various encryption algorithms, notably AES, RSA and DES. Your expertise in these will be key to the successful creation of this utility. • Be committed and focused, as the tool must be completed ASAP. Looking forward to receiving bids from suitable and interested freelancers. Please, when bidding, include any relevant experience and examples of similar projects.

    €20 (Avg Bid)
    €20 Keskimäär. tarjous
    77 tarjoukset

    I need an ETL developer to streamline and automate an existing manual process. This includes: - Transferring two encrypted *. files from a source server to a local machine. - Decrypting these files into *.csv format. - Running SQL on one file and a PowerShell command on the other file to create a staging table. - Setting up a Microsoft SQL Server...- Setting up a Microsoft SQL Server database into read-write mode from read-only. - Reverting the database back to read-only upon task completion. - Sending a report to the user upon task completion. Ideal skills for this job include advanced SQL, PowerShell, and ETL development. Familiarity with read/write permissions on Microsoft SQL Server and experience with data transfer and encryption/decryption processes are also highly benefici...

    €32 (Avg Bid)
    €32 Keskimäär. tarjous
    17 tarjoukset

    I am looking for a specialist to make a custom encryption for my laptop's UEFI firmware at runtime and decr...addressing security vulnerabilities. Here's what I am looking for: - A comprehensive understanding of kali linux as that is the targeted operating system for this project. - Proficiency in dealing with UEFI firmware. Specifically, if you have experience working with the firmware on the Lenovo Ideapad Slim 3 15IIL05, that would be preferable. - Prior experience with firmware encryption and decryption. - An in-depth understanding of mitigating potential security vulnerabilities. With your help to boost my system's security, I look forward to granting only legitimate parties necessary access to my laptop. Please apply if you have the skills and experience to ...

    €1196 (Avg Bid)
    Mainostettu
    €1196 Keskimäär. tarjous
    6 tarjoukset

    I need an expert cryptographer capable of working with custom encryption used for game client files. Specifically, your task will involve the following: - Decrypting game configuration files and game asset files. These two types of files are crucial to the completion of the project. - Explain what is the method used for encrypting the files Ideal candidates for this job would have proven experience in decrypting custom game client files, asset extraction, and game behavior analysis. Please provide a detailed explanation of how you plan to approach this task in your bid.

    €188 (Avg Bid)
    €188 Keskimäär. tarjous
    42 tarjoukset

    I'm currently using PERL 5.10 system and requires a proficient expert to aid in modifying how passwords are hashed in my system. Initially, we employed SHA-256 but we're looking to switch to PBKDF2. Ideal Skills and Experience: - Proficient in PERL 5.10 - Familiarity with SHA-256 and PBKDF2 hashing methods - Prior experience in password re-hashing Task Objectives: - Identify current SHA-256 hashing method in the system - Modify hashing method to use PBKDF2 instead - Validate successful implementation of the PBKDF2 hashing method The project necessitates a strict focus on security and confidentiality given its sensitive nature.

    €12 (Avg Bid)
    €12 Keskimäär. tarjous
    26 tarjoukset

    ...Transaction Validation: You must not use any Bitcoin-specific libraries or frameworks that automate transaction validation processes. The intent of this challenge is for you to understand and implement the validation logic manually. Permissible Libraries: The use of standard cryptographic libraries, such as secp256k1 for elliptic curve cryptography, and standard hashing libraries (e.g., for SHA-256) is allowed and encouraged. These libraries are essential for implementing the cryptographic underpinnings of bitcoin without reinventing the wheel. Implement the Mining Algorithm Yourself: You are required to implement the mining algorithm on your own. This includes creating a way to correctly form a block header, calculate the hash, and meet the challenge of finding a hash below a ce...

    €12 / hr (Avg Bid)
    €12 / hr Keskimäär. tarjous
    7 tarjoukset

    ...Authentication methods, Secret management, and Encryption/Decryption. Key tasks include: To use and operate Vault, we should create a document that shows: -Are there circumstances that would require the Vault master key, and its derived keys to be regenerated? Is there control over the encryption algorithm / primitives selected and used by Vault? How, when and why a secret stored by vault should have its encryption key regenerated? How can vault policies be created? What is the minimum standard for a policy we should be aiming for, e.g. TTL? - Documenting LDAP and token-based authentication methods. - Detailing the process of managing Database credentials, API keys, and Certificates using Vault. - Understanding and writing about the encryption/decryption fundamentals ...

    €17 / hr (Avg Bid)
    €17 / hr Keskimäär. tarjous
    12 tarjoukset

    ...developer to create a decryption application compatible with Linux, specialized in handling Ioncube-encrypted files. The ideal candidate will leverage their robust coding skills and experience to develop a system capable of decrypting multiple files simultaneously. Key functionalities should include: - Compatibility with Linux OS - A user-friendly interface that supports drag-and-drop functionality - Incorporating a progress bar to track the decryption process Proficient experience with Linux platform, a strong understanding of Ioncube encryption, and the ability to create interactive user experiences are required for this project. Your proficient command in innovative coding methods and problem-solving skills should be geared towards achieving an efficient and reliable...

    €102 (Avg Bid)
    €102 Keskimäär. tarjous
    24 tarjoukset

    For this task, I require a skilled developer with solid background in Docker and Kafka. The task at hand is to work on an existing Docker Compose script for a Kafka application centered around authorization. Key Requirements: - Incorporating SASL/SCRAM authentication mechanism. - Focusing on the SCRAM-SHA-256 version for Kafka authentication. A deep understanding of the listed technologies and profound experience in adding security features to Kafka applications will be a significant advantage. Secure, reliable streaming is the goal. Therefore, the freelancer needs to be knowledgeable about how SASL/SCRAM authentication enhances Kafka application's security. Only bid if you are highly confident you can deliver my exact requirement.

    €25 (Avg Bid)
    €25 Keskimäär. tarjous
    4 tarjoukset

    Here is a NodeJs package that is used to decrypt media files received on WhatsApp messages for our clients. This works we...disk. This takes a lot of memory for large files. We need to modify this script so as to return stream instead of data. We should be able to use the stream in a pipeline/pipe. I have a small NodeJS script with above code, that you should take a look at and let me know if you can do it. To accomplish this, you should definitely have: - Experience with advanced NodeJS development and general decryption algorithm - Try not using other external packages, if possible - Ask me for the nodejs project in private message - Should be easy task for someone experienced Thank you in advance for your interest in my project and your bids.

    €44 (Avg Bid)
    €44 Keskimäär. tarjous
    7 tarjoukset

    Hello i need to creare a script on nodeJS for create a wallet eth , the screept need to work on autoincrement and need to have a range page , the script on parameter need to have page start and page stop for generate , every page need to have 128 / 256 result the user need to choise , the result need to be stored on sql server text me for more info

    €24 (Avg Bid)
    €24 Keskimäär. tarjous
    10 tarjoukset

    ...is an author and speaker with strong focus on China. Therefore, red should be the main color. See my substack here: Needs: - Logo for a Homepage (together with set of fonts to use in the homepage) - Logo for Business Cards (together with set of fonts to use on the business card) - Youtube: for channel and watermark Substack: - minimum 256×256 Pixel (square logo) - brand name: minimum 1344×256 aspect ratio: 21:4 - title picture: minimum: 600x600px square LinkedIn: - Round profile picture - rectangle profile background...

    €86 (Avg Bid)
    €86 Keskimäär. tarjous
    92 tarjoukset

    ...an expert to implement advanced AES-256 bit security encryption for an SQLite database in a Windows application using VB.Net. This task requires specific expertise in working with encryption to secure private data. Key Requirements: - Proficiency in VB.Net - Deep understanding of AES-256 bit encryption - Familiarity with SQLite databases - Prior experience in data encryption The encrypted SQLite database will become a storage unit for personal identifiable information. This sensitive data demands high security measures, thus professional handling is crucial for the success of this project. The completed task should ensure maximum protection against unauthorized access and reliably shield the stored personal data. Main Task: - Implement advanced AES-256 bit enc...

    €56 (Avg Bid)
    €56 Keskimäär. tarjous
    2 tarjoukset

    Necessito que as descrições sejam traduzidas de forma correta e com gramática. Quem se candidatar deverá perceber do produto e não fazer tradução literal mas sim dar os nomes corretos em português Necessito de amostra de tradução da linha 142, linha 256, linha 413, linha 1076, linha 1150, linha 1204, linha1229.

    €132 (Avg Bid)
    €132 Keskimäär. tarjous
    32 tarjoukset
    Trophy icon Lawn Care company logo Loppunut left

    Looking for a skilled graphic designer who can help me out in creating a professional logo. My company provides lawn care services. The name of the company is Crabtree Lawn Solutions LLC. I like the idea of having a leaf or a blade of grass somewhere on the logo. The "T" in the word Crabtree could even be a tree. The logo will go on a company vehicle. I also want to add the phone number (256-473-9580) to the bottom of the logo. I really like the example logo that I have attached called "Evergreen". Key requirements for this job are as follows: - Color Palette: The dominant color scheme for the logo needs to be a harmony of green, white, and black. These colors should exude a playful and bold character. - Design Style: The designed logo needs to strike a ba...

    €47 (Avg Bid)
    Taattu
    €47
    657 työtä

    I'm in need of an expert in cryptography, specifically proficient in SHA256, to assist with a custom implementation of a decryption algorithm for data retrieval. The primary responsibilities for this role will include: - Decrypting the SHA256 algorithm with a specific iv and key. - Developing a capability for retrieving transactional data post decryption. - Ensuring the preservation of data integrity during the entire process. Ideal candidates should have experience in data decryption, knowledge of SHA256, and a proven history of successful implementation. The ability to handle confidential transactional data safely and comply with all data security standards is also necessary. This project demands attention to detail, precision, and robust understanding of ...

    €41 (Avg Bid)
    €41 Keskimäär. tarjous
    5 tarjoukset

    I'm currently running Hashicorp Vault with a public SSL/TLS certificate that has expired. I'm seeking an expert that can help to: - Update the expired SSL/TLS certi...with a public SSL/TLS certificate that has expired. I'm seeking an expert that can help to: - Update the expired SSL/TLS certificate - Manage the process securely to prevent any unwarranted access The ideal candidate should have: - Proven practical experience with Hashicorp Vault - Deep understanding of SSL/TLS certificate renewal process - Strong grasp of secret management, data encryption/decryption, and access control - Sound knowledge of cybersecurity best practices. Note: It's okay if you are familiar with any operating system as the specific system Hashicorp Vault is running on won...

    €38 / hr (Avg Bid)
    €38 / hr Keskimäär. tarjous
    5 tarjoukset

    Essentially we convert a string to ASCII. Then find a reversible algorithmn to summate/multiply the keys together. Then with the final variable and other variables such as key length and pigeonholer; We deduce the keys.

    €67 (Avg Bid)
    €67 Keskimäär. tarjous
    1 tarjoukset

    ...vault in my Wildfly 26. The goal is bolstering the security of my data transmission, shielding sensitive data in transit. Features required: - Configure SSL/TLS to desire a 256-bit encryption standard, providing a high level of security, for secure data transmission. - Support for both TLS 1.2 and 1.3 protocols in the SSL/TLS configuration to enable both secure and reliable communication. - Implement Vault setup for effective protection of sensitive data. The ideal freelancer would have: - Extensive experience in handling Wildfly servers. - Detailed knowledge of SSL/TLS configuration and the ability to implement 256-bit encryption. - Familiarity with different TLS protocols and how to support multiple versions. - Proven record of setting up and managing Vaults. Your a...

    €19 (Avg Bid)
    Taattu
    €19
    1 työtä

    I am on the lookout for a CryptoJS expert who is proficient in using IV and keys to decrypt text data. Your task will be: - Decrypting text data with the keys and IV that I will supply. Skills and Experience Needed: To complete this project successfully, you should possess: - Profound understanding of CryptoJS - Experience in decrypting data, specifically text - Skill in using provided IV and keys to decode encrypted data - Incredible problem-solving and communication skills This is a forward-thinking task that requires a professional who is attentive to detail, delivers promptly and comprehends the prime role of data safety and confidentiality. I await your bids.

    €38 (Avg Bid)
    €38 Keskimäär. tarjous
    6 tarjoukset

    I need an expert who's able to decrypt an old .accdb MS Access database for which the encryption key was lost. The database contains precious client information and business transaction data that I want to incorporate into our current database. Here are more specifics of the task: • Database Conversion: The old data...should be incorporated into the current one. As a preference, if the data can comfortably fit, have it provided in an Excel spreadsheet. • Data Cleaning: There's no need for transformations or data cleaning, so the freelancer can skip tasks like removal of duplicates or standardizing formats. Ideal Skills and Experience: • Proficiency in MS Access and Excel • Prior experience with database decryption • Strong understanding of data...

    €151 (Avg Bid)
    €151 Keskimäär. tarjous
    27 tarjoukset

    this is for both bitcoin and litecoin address bitcoin bc1 and tb1 litecoin ltc1 address...understanding various programming concepts. -Bech32 Format Conversion: I am specifically interested in how to convert between formats using Bech32. Your experience with handling this encoding scheme's complexities would be very beneficial. -SHA-256 Functioning: Your in-depth understanding of SHA-256's operation is crucial. I'm not looking to implement it myself yet; I just want to understand how it works under the hood. Ideal skills and experience include a strong working knowledge of Python, expertise in the Bech32 encoding format, and an understanding of SHA-256 hashing algorithm functionalities. If you're a tenacious problem-solver with an educational sp...

    €126 (Avg Bid)
    €126 Keskimäär. tarjous
    2 tarjoukset

    I am searching for a skilled developer to code a new cryptocurrency. Key Features: - The crypto should be capable of encryption and decryption. - Secure key generation is a necessary aspect of this project. Purpose: - This new cryptocurrency will be purposed for financial transactions, providing a new method for investing into our company's projects. Interface: - The platform for this cryptocurrency will be purely web-based, hence strong skills in web development and design are necessary. Ideal Candidate: - An ideal candidate should have experience in cryptocurrency creation as well as web development. Working knowledge of encryption, secure key generation, and building intuitive interfaces suitable for financial transactions would be highly advantageous. Kindly provide...

    €457 (Avg Bid)
    €457 Keskimäär. tarjous
    27 tarjoukset

    I'm looking for a proficient...focusing on their application in user authentication. Key Requirements: - Generation and verification of ECDSA signatures using Botan 2 and Botan 3 - Scripts should be designed for user authentication - The use of SHA-256 as the hashing algorithm for ECDSA signatures Ideal Skills: The ideal freelancer for this project will have extensive experience in Python development with proven knowledge of digital signatures, specifically ECDSA. Familiarity with Botan cryptographic library is a major requirement. They should also have a solid understanding of hashing algorithms, particularly SHA-256. Attention to detail and ability to meet deadlines is also a key expectation. Note: Please remember that I need two scripts, each compatible with Botan...

    €155 (Avg Bid)
    €155 Keskimäär. tarjous
    27 tarjoukset

    Hello prospective bidders, I am in need of a crypto expert that can assist me in implementing encryption, decryption, and hashing principles to my project. About the Project: - Specific cryptographic services required include Encryption, Decryption, and Hashing. - I believe understanding the balance between security and performance is vital, as we wouldn't want to sacrifice one for the other. - The main platforms for applying these services need to run on HackerRank. Requirements: - Demonstrable knowledge on encryption, decryption and hashing principles. - Prior experience in implementing cryptographic services on web-based platforms and HackerRank. - Medium to high understanding of cyber security principles. - Good communication and problem-solving skills. ...

    €13 (Avg Bid)
    €13 Keskimäär. tarjous
    3 tarjoukset

    ...design of the client should be user-friendly, making it easy to traverse and understand. - High performance and stability: Despite its ease of use and setup, the client should not compromise on performance or stability. - The client interface needs the following features: "Connect", "Disconnect", and "Import Config" buttons. Clicking "Import Config" imports a configuration file encrypted with AES-256. The configuration file contains the server IP address, port number, virtual HUB name, username, and password. After importing the configuration file, VPN connections can be made by clicking connect and disconnect. Use direct TCP/IP connections, with an automatic reconnection interval of 15 seconds, always keeping the VPN online. The official c...

    €133 (Avg Bid)
    €133 Keskimäär. tarjous
    4 tarjoukset

    PHP encryption and decryption PHP encryption and decryption PHP encryption and decryption PHP encryption and decryption PHP encryption and decryption

    €92 (Avg Bid)
    €92 Keskimäär. tarjous
    1 tarjoukset

    PHP encryption and decryption PHP encryption and decryption PHP encryption and decryption PHP encryption and decryption PHP encryption and decryption PHP encryption and decryption PHP encryption and decryption

    €61 (Avg Bid)
    €61 Keskimäär. tarjous
    1 tarjoukset

    I’m in need of an intermediate-level C++ coder for a bitcoin mining initiative. The successful applicant must be comfortable with coding for solo mining. This project doesn't require expertise in multi-threading or pool mining, but a firm grasp on the creation and development of bitcoin mining algorithms is essential. An understanding of SHA-256 algorithm implementation is a plus, though not mandatory. Looking forward to your bids, and to our potential collaboration.

    €144 (Avg Bid)
    €144 Keskimäär. tarjous
    14 tarjoukset

    I require a skilled professional to decrypt files that have been encrypted and received a new extension (.cdtt). The original files were in .pdf format. Key Job Details: - No knowledge of the initial encryption method used is available. - There's no time frame imposed, so a meticulous...in .pdf format. Key Job Details: - No knowledge of the initial encryption method used is available. - There's no time frame imposed, so a meticulous, detail-orientated approach can be taken. - The objective is to restore the files to their original, unencrypted state. Ideal Candidate: - Experience in dealing with unknown encryption methods. - Previous work with PDF files and their encryption/decryption. - Strong problem-solving skills. Please place your bid if you meet the criteria and...

    €82 (Avg Bid)
    €82 Keskimäär. tarjous
    2 tarjoukset

    ...create a custom PHP software with a MySQL backend. The software will be incredibly simple: 1. One interface for inputting a handful of fields. After submission, all data will need to go into a MySQL database table. The data in the database will be encrypted and can only be decoded using a decryption key provided in a link. The link will then be provided to view the submission, which the user can copy (to send to someone else). 2. One interface for viewing a submission. This interface will require the decryption key or else an error message will be displayed. This page must be really well formatted -- an example will be provided. 3. On the back-end, we also need some clean-up tasks: Data stored in MySQL must be purged based on expiration dates sent during a submission. ...

    €152 (Avg Bid)
    €152 Keskimäär. tarjous
    98 tarjoukset

    Would you like to do another similar job? 256 transaction. 5 columns. about 20-30 characters per column. 1 additional column what will be one of 3 numbers so not really any effort (just a 4 digit number).

    €47 (Avg Bid)
    €47 Keskimäär. tarjous
    1 tarjoukset

    Hi, I need a python script that transforms the Image into n-different color codes/palettes: 24 colors, 64, 126, 256 . It uses dithering to optimize the Image quality. It uses a fixed color palette. Thanks

    €19 (Avg Bid)
    Kiireellinen
    €19 Keskimäär. tarjous
    11 tarjoukset

    I'm facing issues with RSA decryption in a Laravel project. The error code I'm receiving is: {"response_code":"33","response_description":"Decryption of SessionKey failed","error_details":"error:04099079:rsa routines:RSA_padding_check_PKCS1_OAEP_mgf1:oaep decoding error"}. I realized I need a proficient Laravel developer who's experienced in handling encryption and decryption. Key requirements and issues are as follows: - In-depth understanding of Laravel and encryption techniques, particularly RSA - Locating and fixing the issue preventing successful decryption - Due to preferences, I skipped a question about the storage of RSA keys. Experience working in an environment with unclear RS...

    €171 (Avg Bid)
    €171 Keskimäär. tarjous
    8 tarjoukset

    ...in developing and implementing encryption/decryption methods. - Knowledgeable in cyber security principles and best practices. - Previous experience with data protection and secure coding techniques. Project Details: - The core task involves integrating advanced encryption/decryption protocols into an existing Python application. - The aim is to ensure the confidentiality and integrity of the data handled by the application. - The project will require the freelancer to assess the current state of the application's security, propose a robust encryption solution, and implement it effectively. What I Expect from You: - An initial assessment of the application's current security posture. - A detailed plan outlining the proposed encryption/decryption methods,...

    €33 / hr (Avg Bid)
    €33 / hr Keskimäär. tarjous
    42 tarjoukset

    ...candidate will need to display a strong understanding of modern Angular best practices and should be comfortable working with the latest features introduced in Angular 9 and beyond. - **.NET Core Skills:** Experience in developing backend services using .NET Core. A solid grasp of creating and managing APIs within this environment is crucial. - **Token Encryption/Decryption:** The project's primary aim is to utilize token encryption and decryption for authentication purposes. The freelancer should therefore be knowledgeable in implementing secure token-based authentication systems, ensuring that all data transmissions, particularly those involving user personal information, are protected against unauthorized access. - **JSON Data Exchange:** Mastery in handling JSON d...

    €702 (Avg Bid)
    €702 Keskimäär. tarjous
    37 tarjoukset

    ...freelancer who can implement AES encryption and decryption for text inputs efficiently. My project involves securing sensitive information through encryption and ensuring it can be decrypted back into its original format. Here's what I'm looking for: - **Strong Understanding of AES**: Proficiency in the Advanced Encryption Standard (AES) is a must. You should have a robust grasp of its workings, strengths, and how to implement it securely. - **Encryption/Decryption of Text**: The core task involves encrypting plain text and decrypting it back to its original state. Hence, experience with handling and manipulating text data is crucial. - **Security Best Practices**: Knowledge of security measures and best practices in encryption/decryption to prevent vul...

    €20 (Avg Bid)
    €20 Keskimäär. tarjous
    8 tarjoukset