Suodata

Viimeisimmät hakuni
Suodatusperuste:
Budjetti
asti
asti
asti
Tyyppi
Taidot
Kielet
    Työn tila
    1,284 caesar cipher työtä löytyi, hinnoittelu EUR
    c programme Loppunut left

    ... Test your code on the following ciphertexts, and answer these questions: (a) What is the key of the cipher? (b) What is the decrypted plaintext? Ciphertext 1 (shift cipher) ODKBFAXASKBDQEQZFEMPURRUOGXFKZAFRAGZPUZZADYMXMOMPQYUOPUEOUBXUZQEFTQZQQPRADFTQBDABQDUZFQDM OFUAZARODKBFASDMBTKMZPODKBFMZMXKEUEFTUEMDUEQEAGFARFTQRMOFFTMFUZFTQMNEQZOQARDQMXOAYYGZUOMF UAZEDQCGUDQYQZFEUFUEQMEKFABDABAEQMEKEFQYFTMFMBBQMDEGZNDQMWMNXQYMZKMOMPQYUOPQEUSZEMDQEAOAY BXQJFTMFFTQIAGXPNQODKBFMZMXKEFPAQEZAFWZAIITQDQFAEFMDFQJBAEUZSRXMIEUZFTQEQPQEUSZEUERMDTMDP QDFTMZPQEUSZUZSFTQYUZFTQRUDEFBXMOQFTQDQEGXFUEFTMFFTQOAYBQFUFUHQBDAOQEEITUOTUEAZQEFDAZSYAF UHMFUAZUZMOMPQYUODQEQMDOTOMZZAFFMWQTAXP Ciphertext 2 (Vigen`ere cipher) YYCCIIDCGRBBVVPTLHKEAGRDVFEGTDJPUPLXWJRTFSTXGCZWPKFTEOVVQTOSPKGTLOPUCPKZAVGV...

    €106 (Avg Bid)
    €106 Keskimäär. tarjous
    9 tarjoukset
    Cipher - Quote 8 päivää left

    Deliverables: 2 x Men’s underwear designs Design discussions and initial ideas submitted. Design revisions and collection finalised as range boards. 2D sketches of the final designs; front view, back view, side view and any details. Tech pack created for each garment with material information, printing information, labelling information and measurements (for one sample size) ready to be sent to manufacturers. Weekly calls and updates at each stage of the process. Please note: The fees listed in this document do not include material, sampling, shipping or bulk manufacturing costs. The supplier and materials will ultimately be chosen by the client and therefore the client is liable for any costs agreed upon with the supplier. By agreeing to the proposed fees the client accepts these...

    €630 (Avg Bid)
    €630 Keskimäär. tarjous
    1 tarjoukset

    I'm seeking a skilled professional to create a solution designed specifically for encryption and decryption of cipher text. This cryptography project will focus strictly on the secure communication and data encryption of this particular type of text data. Ideal Skills and Experience: - Strong background in cryptography - Proven experience with cipher text - Familiarity with various encryption algorithms Please note, the specific algorithm to be used wasn't stated. However, your experience and advice will be crucial in determining the most suitable option. I would greatly value your expertise in suggesting the best route. Looking forward to your proposals.

    €18 (Avg Bid)
    €18 Keskimäär. tarjous
    1 tarjoukset

    I'm in need of a skilled and experienced individual who can develop an anti-counterfeiting platform using NTAG 424 DNA NFC tags. The platform needs to ensure that genuine products can be authenticated securely and also prevent counterfeiting. Ideal Candidate: - Strong understanding and experience with NTAG 424 DNA NFC tags - Profic...DNA NFC tags - Proficient in developing secure, dynamic NFC authentication systems - Experience in developing anti-counterfeiting platforms for the pharmaceutical, fashion and luxury goods, and electronics industries - Proficient in creating user-friendly mobile applications -NXP Key Requirements: -understanding of The security features like the SUN (Secure Unique NFC) message feature and CMAC (cipher-based MAC). -Native app development . -datab...

    €304 (Avg Bid)
    €304 Keskimäär. tarjous
    4 tarjoukset

    I am developing a secret key encryption system on Ubuntu. The primary goal is to safeguard ...and enable secure communication. The encryption mechanism should provide a standard level of protection, not too basic yet not overly complex. The system will undergo frequency analysis against monoalphabetic substitution cipher, which requires a certain level of encryption strength to be effective. Key Requirements: - Implementation of a secret key encryption system on Ubuntu - Encryption strength must be set at medium level - Must be able to prevent unauthorized access through frequency analysis against monoalphabetic substitution cipher. -encryption using different cipher and modes -encryption mode - ecb vs cbc -padding, initial vector and error propagation -programming ...

    €25 (Avg Bid)
    €25 Keskimäär. tarjous
    4 tarjoukset

    I have a need for a skilled Pine script developer to develop an automated script for my TradingView pl...functionality and how Pine scripts interact with it. - Extensive experience in developing advanced operations such as multi-timeframe strategies and complex calculations. - Excellent analytical skills, with the ability to understand and outline trading strategies. - Diligence in testing and debugging to ensure the effectiveness and reliability of the script. I use trading view and use 2 indicators, market cipher and super trend, id like a bot which would look at the 1,2,3 and 4 hour trend of bitcoin, if all 4 time frames match id like the bot to buy 0.1 shares of bitcoin and only make 89 ticks for example. The same goes for a sell signal, if all 4 time frames match, id like a se...

    €352 (Avg Bid)
    €352 Keskimäär. tarjous
    21 tarjoukset

    ...currently connected. A window is displayed showing the available information that is being transmitted through the Wi-Fi. This is information regarding your Wi-Fi network that anyone can see. Close this window. Now select a network other than the one to which you are connected and double-click it to display information. After reading the information, close the window. Scroll to the Security and Cipher columns. What security are the networks using? Scroll to WPS Support. How many networks have WPS turned on? Is this secure? What additional information do you find useful? What information would a threat actor find useful? Close all windows. Project 4: Viewing WLAN security information with Vistumbler Description: Vistumbler can be used to display the security information...

    €15 (Avg Bid)
    €15 Keskimäär. tarjous
    6 tarjoukset

    ...files. 5. Ensure that your decryption process accurately recovers the original file, including its correct extension. The decrypted file should be identical to the original input file in every aspect. Topics for Approach 1: Implementation of one of the below algorithms Implementation of DES (Data Encryption Standard) AES (Advanced Encryption Standard) Camellia Blowfish Twofish RC4 (Rivest Cipher 4) Serpent CAST-128/CAST-256 Project Guidelines: 1. Proposal Submission: o ● Submit a proposal outlining the chosen approach and topic. o ● Include a brief description of the methodology for Approach 1 or the selected 2. Research Phase: o ● Approach 1: Conduct research on the chosen encryption algorithm, understanding its principles and functionality. 3. Writing Pha...

    €108 (Avg Bid)
    €108 Keskimäär. tarjous
    43 tarjoukset

    As a tech professional passionate about proper coding practices, I'm in the middle of an application endeavor and I need a helping hand. Specifically, it's a tkinter UI intended for fellow technical professionals, focused on user interface design. Broadly, the application needs: - refactor cu...programming and clean code, well-organized clean architecture are part of the project. Class diagram and use-case diagrams highly appreciated I expect proper separation of concerns and adherence to good coding practices. If you're an experienced Python dev and confident in your tkinter acumen, I'm looking to hear from you. Either for creating the app or guiding me with some help Please add the word: CIPHER to your answer for it to be considered. If you have a portfolio...

    €161 (Avg Bid)
    Kiireellinen Salassapitosopimus
    €161 Keskimäär. tarjous
    9 tarjoukset

    I've successfully set up an OpenVPN server using OpenWrt on my Linksys 3200acm router, generating a profile that functions flawlessly on both my mobile device and Windows application. However, when attempting to use another OpenWrt router as a client, I've encountered connectivity issues. Based on my analysis, it appears to be a cipher-related problem. I'm currently seeking the expertise of a freelancer who can address this cipher issue on the client side. The goal is to establish a functional OpenWrt client VPN using the provided profile. If you have the skills to troubleshoot and resolve this matter, please reach out. Your assistance in ensuring a smooth connection between the routers would be greatly appreciated.

    €15 (Avg Bid)
    €15 Keskimäär. tarjous
    4 tarjoukset

    ...Tomato slices Onion slices (red, white, caramelized) Pickles Cheese slices (cheddar, American, Swiss, pepper jack, blue cheese) Bacon Condiments (ketchup, mustard, mayonnaise, BBQ sauce, hot sauce, aioli, relish) Additional toppings (avocado, mushrooms, fried eggs, jalapeños, coleslaw) Restaurant Food Items (general): Appetizers (mozzarella sticks, chicken wings, nachos, spring rolls) Salads (Caesar salad, Greek salad, garden salad) Soups (tomato soup, chicken noodle soup, clam chowder) Main Courses (steak, chicken breast, fish fillet, pasta dishes) Sides (French fries, onion rings, coleslaw, mashed potatoes) Desserts (cheesecake, chocolate cake, apple pie, ice cream) Additional Ingredients and Food Items: Various types of meats (beef, chicken, pork, lamb, fish, seafood)...

    €34 (Avg Bid)
    €34 Keskimäär. tarjous
    65 tarjoukset

    I'm in need of proficient cryptographic development assistance. My project revolves around various cryptography techniques, specifically: - Caeser cipher - Hill cipher - Vigenere/Vigenere Tableue - Playfair matrix table I already have a determined key/shift value for the Caeser cipher. However, the need to include both encryption and decryption phases will be contingent on the question I provide. Ideal Skills & Experience: • Expert knowledge and experience with the listed cryptographic techniques • Proven track record with encryption and decryption processes • Ability to adapt to specific project needs and requirements • Excellent problem-solving skills Your job will be to assist in cryptography problem-solving, with the potential t...

    €153 (Avg Bid)
    €153 Keskimäär. tarjous
    3 tarjoukset

    Looking for someone who can create sexy silhouettes of African American women, men and couples in sexual and intimate poses to be used on cards, book covers, etc. I'll also need more vivid illustrations or photos of different hues of attractive African American muscular, athletic men with and without tattoos, shirtless or with wife beaters on with various hair styles including locs, baldhead, Caesar fades, waves with beards or clean-shaven faces etc. Photos of different hues of African American women with short cuts, locs, braids, bob hair styles, curly fros in sexual poses and also engaging in sisterhood activities. I'd also like illustrations of African American couples in very intimate and sexual poses. Can start with 1 of each photo. I will attach photos of some ideas...

    €30 / hr (Avg Bid)
    Salassapitosopimus
    €30 / hr Keskimäär. tarjous
    32 tarjoukset

    I am looking for a skilled freelancer to build a graphical editor for configuring public key cipher schemas. This project involves the RSA and ELGamal algorithms and requires the use of the Sirius framework. Preferred Programming Language: Python Graphical Components: The client will provide a list of components that should be included in the editor. Deadline: The project must be completed within 1-2 weeks. Skills and Experience: - Strong proficiency in Python programming language - Experience with graphical editor development - Familiarity with public key cipher schemas and encryption algorithms (RSA and ELGamal) - Knowledge of Sirius framework for graphical modeling tools - Ability to implement drag and drop functionality for the graphical components

    €101 (Avg Bid)
    €101 Keskimäär. tarjous
    20 tarjoukset

    BEFORE APPLYING We will be requesting examples of your work, and a quick voice cal...Cloudsave, bot protection, securing economy) As the client/server are fairly simple I'd expect this piece of work to take 2 days for someone who has done it before, with an additional 1 day for discussions/revisions etc. So allow a total of 3 days for this project. There is further work required as separate projects, based on the outcome of this one. To apply: - Begin your message with the word "cipher" to prove you've read this description - Send an example of previous work where you implemented end to end UGS encryption - this could be a link to a published game, a design document, a process flow or even a text description. We will deep dive into the details on the call with...

    €542 (Avg Bid)
    €542 Keskimäär. tarjous
    35 tarjoukset

    ..."unsupported protocol" notices when trying to log on. Requirements: - Expertise in WordPress and website security - Familiarity with SSL protocols and cipher suites - Ability to identify and resolve issues related to unsupported protocols - Experience in updating WordPress websites to ensure compatibility with the latest SSL standards Tasks: - Assess the current version of WordPress being used on the website - Identify the specific areas of the website where the "unsupported protocol" issue is occurring - Determine if an SSL certificate is being used on the website - Update the website, if necessary, to support a common SSL protocol version or cipher suite - Ensure that visitors can log on to the website without encountering any "unsupported pro...

    €17 / hr (Avg Bid)
    €17 / hr Keskimäär. tarjous
    53 tarjoukset
    Pipeline Project Loppunut left

    Menghitung menggunakan software CAESAR 1. Pipeline stress analysis 2. Pipe buckle upheaveal calculation 3. Pipeline Hydraulic Simulation

    €368 (Avg Bid)
    €368 Keskimäär. tarjous
    21 tarjoukset

    ...understanding of network protocols, encryption algorithms, and mobile application security to assist with a project. The ideal candidate should have expertise in TCP, HTTP, GRPC, as well as encryption algorithms such as Diffie-Hellman, HMAC-SHA1, and Shannon cipher. The desired outcome of this project is to reverse engineer a private API. Key Requirements: - Proficient understanding of network protocols including TCP, HTTP, and GRPC. - In-depth knowledge of encryption algorithms such as Diffie-Hellman, HMAC-SHA1, and Shannon cipher. - Familiarity with Frida/JS and Java for decompiling APKs and analyzing mobile application security. - Ability to identify and hook into functions within decompiled APKs for script implementation. - Experience in decrypting TCP traffic for f...

    €6714 (Avg Bid)
    €6714 Keskimäär. tarjous
    66 tarjoukset

    We need support to resolve some penetration ...alternatives, such as SHA-256, SHA-512, SHA-3, etc. We are able to find these references in the application references but these references are related to Expo packages and can’t be changed. 2-Application uses Cipher Block Chaining (CBC) as it’s encryption mode, along with Public Key Cryptography Standards (PKCS5/PKCS7) padding. This configuration is known to be vulnerable to Padding Oracle attacks. Security Recommendations: Encryption operation mode and the padding scheme should be chosen appropriately to guarantee data confidentiality, integrity and authenticity. We tried to find out these Cipher in the application but unable to find any keywords with “” Hence please dont accept the job unless you kn...

    €150 (Avg Bid)
    €150 Keskimäär. tarjous
    18 tarjoukset

    FrontEnd UI/UX Design / Make website visually appealing Main Goal of the website: Challenge website for cipher peer testing Design preferences: No, I am open to suggestions Target audience: Young adults (18-30) Timeline: Need in 5 hours at max Budget: Maximum 30$ Only need HTML and CSS file. Show me sample design and I will choose which looks best, and then you proceed with building it. Skills and experience needed: - Strong UI/UX design skills - Proficiency in front-end development languages such as HTML and CSS - Experience in creating visually appealing websites - Understanding of user behavior and ability to create intuitive user interfaces - Knowledge of responsive design principles - Ability to collaborate with the client to incorporate their vision and suggestions - Attent...

    €32 (Avg Bid)
    €32 Keskimäär. tarjous
    26 tarjoukset

    I'm looking for a talented lyricist to write an R&B sentimental romantic music song with abstract and metaphorical lyrics that convey a feeling of sadness and heartbreak. The style of the lyrics should be creative, sensitive, emotion-filled, and engaging. Something close to Daniel Caesar, Joji, Keshi, JasonTheWeenie type songs. The song should be both catchy and captivating, standing out for its unique use of language and thoughtful composition. I'm looking for someone who is experienced with the craft and will strive to create a memorable piece of art. If you think you have what it takes to create a perfect piece of music with a great combination of R&B, sentimental, romantic, and abstract themes, then I'd love to hear more from you!

    €84 (Avg Bid)
    €84 Keskimäär. tarjous
    32 tarjoukset

    ...description, calories, price - description get from the pdf starting at page 12 look for item and then combine product description and product attribute and make that the description on the menu, if you need to find a better description on google then do so - Pricing for all items is $15 - calories, look up online and multiple by quantity served stated on the pdf MENU Appetizers/Small Plates Caesar Salad Chicken Wings Mozzarella cheese sticks Nachos Sandwiches & Entrees (Comes with 1 Side) Classic Burger (Add Cheese $) Italian Sandwich Pizza (cheese and pepperoni) Chicken Breast Chicken Tenders Quesadilla - cheese Salmon Sides Roasted vegetable Asparagus, Steamed Fries Roasted fingerling potatoes Dessert Lava Cake Cinnamon Rolls New York Cheesecake DRI...

    €30 (Avg Bid)
    €30 Keskimäär. tarjous
    96 tarjoukset
    Trophy icon Design menu Loppunut left

    ...description, calories, price - description get from the pdf starting at page 12 look for item and then combine product description and product attribute and make that the description on the menu, if you need to find a better description on google then do so - Pricing for all items is $15 - calories, look up online and multiple by quantity served stated on the pdf MENU Appetizers/Small Plates Caesar Salad Chicken Wings Mozzarella cheese sticks Nachos Sandwiches & Entrees (Comes with 1 Side) Classic Burger (Add Cheese $) Italian Sandwich Pizza (cheese and pepperoni) Chicken Breast Chicken Tenders Quesadilla - cheese Salmon Sides Roasted vegetable Asparagus, Steamed Fries Roasted fingerling potatoes Dessert Lava Cake Cinnamon Rolls New York Cheesecake DR...

    €18 (Avg Bid)
    Taattu
    €18
    68 työtä

    Sn. No. Activity / Task 1 Vulnerable and Outdated Components 2 Lack of Security Headers 3 Email Harvesting 4 No Captcha 5 Domain Access via IP address 6 SSL Certificate with Weak Cipher Suites 7 Website Speed Is Slow 8 Acknowledge Upload Problem In Unit Officer 9 GPF Master Problem In Admin Panel 10 Unit ID Is Still Working After Blocking It 11 A Unit Officer Cant Register On Two Different Units With Same Mobile Number 12 As Mobile No Is Updated SMS Will Be Send To The Mobile No That Your Data Is Updated Create Your User ID 13 Payslip Can Be Downloaded Of Users From Admin Panel 14 Demand Convert Format Template Should Be Changed 15 Images Are Not Showing On Website Home Page 16 E-Book Of Appendix-J Is Not Working 17 In Important Links Principal Controller of Defence Accounts(Bord...

    €270 (Avg Bid)
    €270 Keskimäär. tarjous
    14 tarjoukset

    I am looking for a Freelancer to create an NS3 simulation script for me. The specific network scenario that I would like to simulate is a Wireless S...latency metrics. This project should be completed within the given time frame. If you are experienced in NS3 and can confidently create the simulation script with the necessary parameters, then I look forward to hearing from you. Thank you for your consideration. It should test for TLS 1.3 supported cipher suites which are: TLS_AES_128_GCM_SHA256 TLS_AES_256_GCM_SHA384 TLS_CHACHA20_POLY1305_SHA256 TLS_AES_128_CCM_SHA256 TLS_AES_128_CCM_8_SHA256 Also the characteristics to be tested for each cipher suite are as follows: Encryption Overhead Decryption Overhead Negotiation Time Connection Establishment Time Throughput Handshake...

    €4 / hr (Avg Bid)
    €4 / hr Keskimäär. tarjous
    2 tarjoukset
    Black Jack Cipher Loppunut left

    I am looking for a skilled developer who can help me with the Black Jack Cipher project. The desired outcome of this project is to decrypt an existing cipher that is of advanced complexity. Skills and Experience: - Strong understanding of encryption algorithms and ciphers - Experience in decrypting advanced level ciphers - Proficiency in software development and programming languages - Knowledge of cryptography and security protocols Timeline: - The expected timeline for this project is to be determined. If you are confident in your skills and have experience in decrypting advanced level ciphers, please submit your proposal.

    €152 (Avg Bid)
    €152 Keskimäär. tarjous
    22 tarjoukset

    Patch mod_ssl-2.8.31-1.3.41 (or apache) to: 1) disable Disable Export Cipher Suites 2) Deploy (Ephemeral) Elliptic-Curve Diffie-Hellman (ECDHE) 3) Use a Strong, Diffie Hellman Group Guide to Deploying Diffie-Hellman for TLS: I have a working Apache 1.3.41 + mod_ssl-2.8.31-1.3.41 + openssl-1.0.1k + php 4.4.9. Openssl was installed like this: Apache 1.3.41 was installed like this: PHP 4.4.9 was installed like this: Downloads: http://67.215

    €527 (Avg Bid)
    Mainostettu
    €527 Keskimäär. tarjous
    10 tarjoukset
    Try to Hack Me Loppunut left

    Hello, I need 1 hour of support in order to use https://tryhackme.com. For example now i'm getting this errror when I try to conenct from Kali VM: 2023-09-03 02:14:30 Note: --cipher is not set. OpenVPN versions before 2.5 defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers. 2023-09-03 02:14:30 Note: cipher 'AES-256-CBC' in --data-ciphers is not supported by ovpn-dco, disabling data channel offload. 2023-09-03 02:14:30 OpenVPN 2.6.3 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] [DCO] 2023-09-03 02:14:30 library versions: OpenSSL 3.0.9 30 May 2023, LZO 2.1...

    €15 (Avg Bid)
    €15 Keskimäär. tarjous
    4 tarjoukset

    I am seeking a talented animator to create a 30-60 second YouTube short featuring a rabbit that looks like Julius Caesar giving a speech amongst other things. The animation style should be 2D. I have a general idea of what I want this video to be, however I am open to suggestion and creativity. will do the audio and voiceover.. I would like 1-3 revisions of the animation.

    €353 (Avg Bid)
    €353 Keskimäär. tarjous
    56 tarjoukset

    Hello Everyone, We want a Domain Name Suggestion for an Company with .com extension in regular price. NOTE: 1. There should be .com extension available at regular price 2. Lesser the character but better the name 3. It should be like Forbes, bloomberg, The New York Times, Wall Street Journal, Financial Times, New York Magazine, The Economist, Kiplinger....Magazine, The Economist, Kiplinger. 4. If possible word should have some meaning 5. It will be a website will show World's greatest leaders like Winston Churchill (1874-1965) Martin Luther King Jr (1929-1968) Abraham Lincoln (1809-1865) Mother Teresa (1910-1997) Napoleon Bonaparte (1769-1821) George Washington (1732- 1799) Dalai Lama (1935-present) Julias Caesar (100...

    €13 (Avg Bid)
    Taattu
    €13
    77 työtä

    ...samples demonstrating their expertise in Matlab encryption projects - The ability to provide detailed project proposals for encryption tasks - The project must be completed in 2-3 days due to shortage of time -I want a project which uses hybrid encryption (AES+ECC) in 3 ways to encrypt and decrypt the text message -The three ways are : 1. In which first the plain text is encrypted using Aes and the cipher text obtained is again encrypted with ECC algorithm. 2. In the second method, the Aes key is divided into 4 parts and one of the part is encrypted by ECC and a new AES key is formed(joining encrypted part with rest of key) and with the help of new key , plain text will be encrypted. 3. In third method , the whole aes key is encrypted by ECC and then encrypted text act as new AeS...

    €48 (Avg Bid)
    €48 Keskimäär. tarjous
    2 tarjoukset
    Trophy icon Supplement Label Design Loppunut left

    ...com/document/d/1Dhyx9aj-Z6iLtoXElToEpEahOby26kiILZLteosBTKo/edit?usp=sharing Therefore, we would like to add some hidden stuff inside the red lines, being this the “background” of the label. For example: You can do the borders as in the US dollar bill, and on every corner, have one of the following elements: Ankh cross, astral compass, esoteric hourglass, unfinished pyramid, 13 stars, cryptic cipher and/or the Latin phrase: Annuit Coeptis or Novus Ordo Seclorum. If you have any questions feel free to reach out!...

    €139 (Avg Bid)
    Taattu
    €139
    98 työtä

    Implementing tested cmac authentication on a RL78 microcontroller We are looking for a skilled freelancer to assist us in implementing CMAC (Cipher-based Message Authentication Code) authentication on an RL78 microcontroller using RL78's embedded system programming capabilities. The project will involve integrating the necessary cryptographic libraries and functions to perform the CMAC calculations efficiently. Freelancer will need to configure the RL78 microcontroller to support the CMAC implementation. This includes setting up the required memory, registers, and peripherals to handle the cryptographic operations efficiently. Testing and validation of the CMAC implementation will be required to ensure its correctness and reliability.

    €433 (Avg Bid)
    €433 Keskimäär. tarjous
    15 tarjoukset

    I am looking for a developer who can create a Smartphone App using Xamarin Visual Studio 2022. The primary function of the app is: Encrypt text using Caesar cipher algorith () Decrypt text using Caesar cipher algorith () Add Google AdMob "banner" to the App Design: Attached is a wireframe of the App I need. Platforms: The app should be developed for both iOS and Android platforms using Xamarin/Visual Studio 2022. Ideal Candidate: The ideal candidate for this project should have experience in developing Smartphone Apps using Xamarin Visual Studio 2022. They should also have a good understanding of mobile app security protocols and be able to implement these into the app. Additionally, the candidate should

    €23 (Avg Bid)
    €23 Keskimäär. tarjous
    2 tarjoukset

    Our website is currently down and we have had a hostmonster expert fix it over 3 times and it still is giving the ERROR below. The connection for this site is not uses an unsupported protocol. ERR_SSL_VERSION_OR_CIPHER_MISMATCH Unsupported protocol The client and server don't support a common SSL protocol version or cipher suite. WE need someone to go into our hosting site and fix the issue.

    €114 (Avg Bid)
    €114 Keskimäär. tarjous
    46 tarjoukset

    ...interface. Detailed Specifications: 1. Scanning QR code: The application will use an existing open-source library to scan a QR code from a piece of paper. The open-source library available at should be used for this purpose. 2. Decrypting the QR code: The scanned QR code will contain encrypted data. The data will be encrypted using AES-256-CBC cipher and hashed using 'sha3-512'. The encryption is done in PHP. The application should be capable of decrypting this data. You will be provided with the necessary key for decryption. 3. Decompressing the data: After decryption, the data should be decompressed. The data will be compressed using gzcompress function in PHP. 4. Displaying the data: Before displaying the data on the mobile screen, the

    €196 (Avg Bid)
    €196 Keskimäär. tarjous
    36 tarjoukset

    Good day, I have designed a static logo which has been approved. I need this logo to be animated for a website so we can load it and let it run on the splash page. I have all the files, fonts and the approved criteria for the animation.

    €97 (Avg Bid)
    €97 Keskimäär. tarjous
    49 tarjoukset

    ...See the attached design. This is EXACTLY what I need First image - globe, with Cipher and little block that make a circle: -The animation should be in a file format that can play embedded on a website on a smooth loop. Using the graphics and logo I sent, the logo must have the following animations: -The earth globe must spin slowly from left to right -The circle made up of little cubes must spin and rotate clockwise around the globe. -The binary 1's & 0's must spin within this circle. -It must be scalable on the website page. -It must be lightweight to not cause lagging on the website. -The "network" connections on the globe must pulsate giving the idea that everything is connected. Second image, globe with Cipher with black circle: -The animation...

    €89 (Avg Bid)
    €89 Keskimäär. tarjous
    89 tarjoukset

    I have an algorithm code that I need to modify or write new code in another way by Block cipher algorithm

    €34 (Avg Bid)
    €34 Keskimäär. tarjous
    6 tarjoukset

    I need the help of a Mechanical or Structural engineer who can help me with stress analysis of a Piping system and Generate Detailed reports using CAESAR II quite urgently, if you have the skills, kindly reach out to me

    €103 (Avg Bid)
    €103 Keskimäär. tarjous
    6 tarjoukset
    Trophy icon I need a cryptographer Loppunut left

    I need help figuring out the encryption technology used. I have the encryption key, just do not know the cipher used. The first person to post the correct answer wins. The encryption key as pulled from the system - 90|243|63|133|230|21|195|125|173|249|168|78|251|9|208|31 The encrypted string - NIrQMMouQp4BSIcRh622fg== The decrypted string starts with a 4 and is all numbers. AND IS 9 DIGITS LONG If there is a winner, the winner will be offered a freelance job. UPDATE --- Here is a new string with results. If you can tell me what decryption/cipher you used to recreate the same results, and I can reproduce the results, you will win. Unecrypted String = 123456789 Encrypted = dpuY83svYbHnw1HVfNVByg== Key = 90|243|63|133|230|21|195|125|173|249|168|78|251|9|208|31 The key is...

    €254 (Avg Bid)
    Taattu
    €254
    22 työtä

    Working on a conference and I need someone dressed as Caesar and Cleopatra to be in character and excite people about an upcoming event at Caesar's Atlantic City. This would take place on the grounds at a country club at the start of lunch with a big entrance. This would be for about 3-4 hours in Westchester, NY. You would need to provide the costume.

    €693 (Avg Bid)
    Paikallinen
    €693 Keskimäär. tarjous
    1 tarjoukset

    Optimization of TradingView Strategy Code using Pine Script I am looking for an experienced freelancer to optimize the sell signals of my strategy code which is built on "Cipher Twister - Long and Short" as seen on TradingView. *(Please find the code attached to the description. When you install it, change the orders to "Market"). Some of the tasks asked are: - Review the indicator settings: Take a closer look at the ChanLength and AvgLength parameters. Adjusting these values may help fine-tune the indicator's sensitivity and improve the accuracy of the sell signals - Delete unnecessary messages in the code - Analyze the exit conditions: Examine the logic and conditions used to determine the exit points for long and short positions. Add...

    €442 (Avg Bid)
    €442 Keskimäär. tarjous
    16 tarjoukset

    ...binary data intended for encryption, outFile is the output file where you save all the necessary data for decryption, and publicKeyFile is the public key that will be used to encrypt the symmetric key. The parameter symmetricCipher is the name of the symmetric cipher. The function generates a symmetric (shared) key and an initialization vector (IV), which will be the input to the symmetric cipher symmetricCipher. You will encrypt the data in inFile with this cipher, key, and IV. Also, you encrypt the symmetric key with an asymmetric cipher (RSA) using the public key stored in publicKeyFile. OpenSSL does most of the work for you: PEM_read_PUBKEY reads the public key, EVP_SealInit generates a shared key and IV (if necessary), encrypts the shared key, and set...

    €34 (Avg Bid)
    €34 Keskimäär. tarjous
    5 tarjoukset

    I have .net web application and i have installed SSL certificate and it's showing website uses an unsupported protocol. ERR SSL OR CIPHER MISMATCH

    €75 (Avg Bid)
    €75 Keskimäär. tarjous
    4 tarjoukset

    I need an app that will display an AI avatar of a famous person who has passed away. For example Caesar. The 3d body face model and animations will be made by us. There will also be a database of Caesar's life and information about him. My intention is to use API from chatgtp (or any other API) Your job is to create the application where Caesar will appear and the user of the application will be able to have a conversation with Caesar, when the questions - conversation is about the life and events that concern Caesar, the model will compose the answers through the base that we will have made for Caesar, For the rest of the topics he will use the base of the API. The conversation will be voiced and not in English

    €1046 (Avg Bid)
    €1046 Keskimäär. tarjous
    24 tarjoukset

    I am looking for an experienced engineer with proficiency in Caesar modelling to conduct a stress analysis on an onshore piping system, in accordance with the standards defined by ASME B 31.3. This includes buckling analysis, fatigue analysis, and modal analysis to ensure the design is safe and durable. Expertise with piping stress analysis is essential for this project, and experience with the Caesar modelling system is preferred. If you have relevant experience and knowledge of the ASME standard, please submit your services for this project.

    €169 (Avg Bid)
    €169 Keskimäär. tarjous
    13 tarjoukset

    Perform stress analysis of a 50km long natural gas distribution line between cities. The stress analysis to be performed using CAESAR II software. Pipe routing and P&IDs will be provided along with the mechanical and design specifications.

    €22 / hr (Avg Bid)
    €22 / hr Keskimäär. tarjous
    11 tarjoukset