Suodata

Viimeisimmät hakuni
Suodatusperuste:
Budjetti
asti
asti
asti
Tyyppi
Taidot
Kielet
    Työn tila
    1,943 rsa työtä löytyi, hinnoittelu EUR

    Adjust my WHM exim settings to warn and not reject emails and document process of whitelisting ip's and domains rejected your message to the following email addresses: rose (rose ) Your message couldn't be delivered because the recipient's email server (outside Office 365) rejected your message beca...returned message denied by administrative policy -> 550 Administrative prohibition Diagnostic information for administrators: Generating server: rose Remote server returned '550 5.7.360 Remote server returned message denied by administrative policy -> 550 Administrative prohibition' Original message headers: ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=; cv=none;

    €87 (Avg Bid)
    €87 Keskimäär. tarjous
    4 tarjoukset

    # Goal: Install Vault Up to HTTPS #Used this Video for the HTTPS certificate at the start sudo mkdir /opt/vault sudo mkdir /opt/vault/tls sudo mkdir /opt/vault/opt openssl req -out -new -keyout -newkey rsa:4096 -nodes -sha256 -x509 -subj "/O=HashiCorp/CN=Vault" -addext "subjectAltName = IP:0.0.0.0,DNS:8.8.8.8" -days 3650 # the installation command were incomplete but matched the Official Site sudo apt update && sudo apt install gpg wget -O- | sudo gpg --dearmor -o /usr/share/keyrings/ gpg --no-default-keyring --keyring /usr/share/keyrings/ --fingerprint echo "deb [arch=$(dpkg --print-architecture) signe

    €9 / hr (Avg Bid)
    €9 / hr Keskimäär. tarjous
    6 tarjoukset
    data encryption Loppunut left

    Data Encryption Project I am looking for a freelancer who can help me with an advanced data encryption project. The following are m...requirements: - Advanced Encryption: The encryption level required for the project is advanced. - Asymmetric Encryption: I prefer asymmetric encryption method or algorithm. - Data Storage: The primary purpose of the encrypted data is for data storage. Ideal Skills and Experience: - Experience in advanced encryption techniques and methodologies. - Proficient in asymmetric encryption algorithms such as RSA, DSA, or ECC. - Familiarity with data storage and database systems. - Knowledge of encryption standards and protocols. If you have the skills and experience required for this project, please submit your proposal with your relevant experience and ...

    €5 / hr (Avg Bid)
    €5 / hr Keskimäär. tarjous
    6 tarjoukset

    I have some cryptographic / mathematical questions that I need help with. Please reach out if you can assist in - Sharing secret keys using trusted central authority - One time Pad - Fermats little theorem - RSA Public Key Cryptosystem - Elgamal Public Key Cryptosystem

    €56 (Avg Bid)
    €56 Keskimäär. tarjous
    20 tarjoukset
    Mallox decryption Loppunut left

    My current project involves Mallox Ransomware decryption and I'm in need of experienced help. This project requires intense security knowledge and the use of advanced encryption methods - AES, Triple DES, and RSA. I believe the project to be of a hard difficulty level and am not specifying a language preference. If you think you're up for the challenge and want to join the fight against cybercrime, I'd love for you to help me out on this project.

    €488 (Avg Bid)
    €488 Keskimäär. tarjous
    8 tarjoukset

    ...key that will be used to encrypt the symmetric key. The parameter symmetricCipher is the name of the symmetric cipher. The function generates a symmetric (shared) key and an initialization vector (IV), which will be the input to the symmetric cipher symmetricCipher. You will encrypt the data in inFile with this cipher, key, and IV. Also, you encrypt the symmetric key with an asymmetric cipher (RSA) using the public key stored in publicKeyFile. OpenSSL does most of the work for you: PEM_read_PUBKEY reads the public key, EVP_SealInit generates a shared key and IV (if necessary), encrypts the shared key, and sets the context, EVP_SealUpdate and EVP_SealFinal work the same as in previous tasks. Hybrid encryption is able to encrypt for multiple recipients. The data is encrypted onl...

    €34 (Avg Bid)
    €34 Keskimäär. tarjous
    5 tarjoukset

    C# code for RSA/ECB/PKCS1Padding encrypting and decrypting. Code must be ready to build to dll file which will be ready to be attached to MS SQL. Code must be only with System or Microsoft Libraries otherwise with other libraries ready to be linked to MS SQL (BouncyCastle library is isn't). Code must have two functions: EncryptRSA (string plainText, string|byte[] publicKey) returns Base64 encrypted plainText. DecryptRSA (string encryptedText, string|byte[] publicKey) returns plainText as string. Public Key may be in formats attached to this question. 1. PEM 2. Sun RSA public key, 2048 bits - info 3. DER

    €110 (Avg Bid)
    €110 Keskimäär. tarjous
    10 tarjoukset

    ...No other options are desirable. I am the ssh client and recently upgraded to Ubuntu 22.04 which runs openSSH 8.9 However one of the servers I am trying to reach is running an older version of openSSH. The admin on the server side can't upgrade his version of openSSH. Because on my new version of openSSH, the ssh-rsa (the most used key type) is disabled, I am no longer able to sftp into the server using my existing key pair. I am trying to use the "-oHostKeyAlgorithms=+ssh-rsa" flag on my command line, which is supposed to allow me to continue to use my old key; however, while this gets me further along, it is ultimately unsuccessful. Please note: you will NOT get access to my machine. You will need to speak with me in real-time to guide me verbally as...

    €37 / hr (Avg Bid)
    Kiireellinen
    €37 / hr Keskimäär. tarjous
    1 tarjoukset

    Hi Hicham O., I noticed your profile and would like to offer you my project. We can discuss any details over chat.

    €140 (Avg Bid)
    €140 Keskimäär. tarjous
    1 tarjoukset

    I'm looking for help in building a secure RSA Encryption in Flutter. This project requires generating a public/private KeyPair using RSA, and I do not have existing code for this. I want to use below Package Check ==> Asymmetric RSA Check Source Code ==> Requirement within 2 to 3 Days 1) Don want Login or API Integration in App 2) I want only Running Source Code to implement in my app Step 1) generate Public and Private KeyPair Step 2) Encrypt Plain text data Step 3) Decrypt That Data

    €111 (Avg Bid)
    €111 Keskimäär. tarjous
    5 tarjoukset

    We use 2 products, Kaseya VSA and HaloPSA. I'm looking for someone to navigate OAuth2 and produce an .net core OAuth2 based client to both systems so I can use their API's to sync Asset, alerts, and ticket data.

    €38 / hr (Avg Bid)
    €38 / hr Keskimäär. tarjous
    10 tarjoukset

    e...best protect our users from spam, the messagen5.7.26 has been blocked. Please visitn5.7.26 for moren5.7.26 information. y5-20020aa78f25000000b005a8bc137b77si7754557pfr.134 - gsmtp' (delivery attempts: 0)>' am using v=spf1 +mx +a +ip4: +include: +include: -all v=DKIM1; k=rsa; p=MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA3TmpTjmlwXuELipgPAMUMTBHUJL7NIwHKkYB43X/IAmHterEQDi5EyIfcBlz/XIKuEvPIrnRY3XXVFLaekpoWAa3DE/AOaDD/bFYSyUtRM6bw4MOU1FgEo46ZVjViavYL6VHYGu55YBLGd1QnP+Kxn6f6rOG6MNNm7dMLBvr5gbaT/GEImcXGa/0jM7uCYfLATxAuZijjrq56gZeWSPzfTv06t4WM3edMwZxAtrbMhw7Hl8QLv7b45Di8J0bFQZA3vcENNvskVxsaDqZRHDRocdi9uk4+jFIV0KEBqXmL3OwLiw5f6nOHNO4OnZusfJyALNtpze2ImBwfDF8mw/slQIDAQAB;

    €66 (Avg Bid)
    €66 Keskimäär. tarjous
    24 tarjoukset

    I have several types of private keys from SSH to Crypto on various blockchains. I want 5 d...NIST P-256 Curve: secp256k1* Schnorr signature scheme (default for secp256k1) Curve: BLS12-381-Jubjub* Used for zero-knowledge proofs EdDSA Curve: curve25519 Curve: secp256k1 Curve: EdDSA* Uses non-standard hashing algorithm Curve: Bulletproofs Used for range proofs Winternitz OTS Curve: secp256k1 Curve: curve25519 Curve: NIST P-256 ZK-SNARKS Curve: secp256k1 Curve: BLS12-381-Jubjub* RSA RSA key length: 3072 bits RSA key length: 4096 bits Skills: Shamir's Secret Sharing / homomorphic encryption This will be used in a world changing project that already has many completed aspects before we launch. Looking for bright ambitious minds to join our team. Let me know how you...

    €19 / hr (Avg Bid)
    €19 / hr Keskimäär. tarjous
    7 tarjoukset

    develop a software program that allows them to generate keys and encrypt and decrypt their files using Java, You should the users with two options: 1. Symmetric cipher using AES with the following capabilities: a. Key generation. b. File encryption. c. File decryption. 2. Asymmetric cipher using RSA with the following capabilities: a. Key generation b. File encryption c. File decryption make the program easy to use

    €107 (Avg Bid)
    Kiireellinen
    €107 Keskimäär. tarjous
    3 tarjoukset

    Hi, I have an integration that I am working on that requires a PHP file to collect some/all/daily data from an SFTP remote folder. The host has the public key and we have the private key (in text form - might need a change of format?) (RSA SSH-2 2048 bit compliant). The PHP file will run from our server, log into the SFTP folder using the supplied credentials and download the necessary file to our server. Please bid your total price, not hourly. If you bid a low amount, and increase the price before work, you will be blocked.

    €174 (Avg Bid)
    €174 Keskimäär. tarjous
    45 tarjoukset

    ...encrypted security token could not be resolved from the following security key identifier '<e:EncryptedKey xmlns:e=""><e:EncryptionMethod Algorithm=""><DigestMethod Algorithm="" xmlns="" /></e:EncryptionMethod><KeyInfo xmlns=""><o:SecurityTokenReference xmlns:o=""><X509Data><X509IssuerSerial><X509IssuerName>CN=DigiCert TLS RSA SHA256 2020 CA1, O=DigiCert Inc, C=US</X509IssuerName><X509SerialNumber>18914240108838841391564841906577021743</X509SerialNumber></X509IssuerSerial></X509Data></o:SecurityTokenReference></KeyInfo><e:CipherData

    €293 (Avg Bid)
    €293 Keskimäär. tarjous
    3 tarjoukset
    Simple VoiceBot Loppunut left

    ...Username, ChatList Password, TimeOut ...etc. NOTICE: ChatList Username/Password are different to SFTP/SCP Username/Password !! Check item #4 below in detail. 2) Flutter provides one GUI to allow user to set up ChatList username/Password, Language Preferred, First Photo filename. 3) Chat List is stored on one SFTP server and Flutter program must download the Chat List from the SFTP Server with rsa/dsa key. 4) Flutter VoiceBot program must check the version of the Chat List regularly. If the version of Chat List is newer, Flutter program must download the newer version automatically via SFTP/SCP and then overwrite the local old version. Besides, Flutter must also download all new files from /var/media/ChatList-Username/* on SFTP server to the local /var/media/ where ChatLis...

    €145 (Avg Bid)
    €145 Keskimäär. tarjous
    8 tarjoukset

    RSA, WEP , Protocol verification with scyther , secure communication city a to b

    €104 (Avg Bid)
    €104 Keskimäär. tarjous
    3 tarjoukset

    Need help on a report about computer security, including basic RSA algorithms , cryptography

    €63 (Avg Bid)
    €63 Keskimäär. tarjous
    21 tarjoukset

    ...Assessment Task 2: Hints and Tips The Guidance on Written Assessments section, accessible from the left-hand menu, takes you through the process of writing written assessments, including advice on how to structure your argument and how to support it with evidence. WA2 asks you to write the script of a talk. For examples of the style you might adopt for your talk, please refer to the TedTalks or RSA presentations used in the modules or available on their websites. However, please note that the transcripts of these talks are normally longer than 1200 words, so your talk will be shorter. - What do we mean by 'specific examples of leadership' in the task description? This means we would like you to include actual, real-world examples of leadership to illustrate and/or s...

    €35 (Avg Bid)
    €35 Keskimäär. tarjous
    57 tarjoukset

    ...this assignment, the task is to implement a simulation of TLS in any coding language of your choice, including the two key exchange methods (RSA and Diffie-Hellman). The implementation is only a simulation of what happens in real-life. You can use variables, classes, methods to represent the operations done by the client and the server. No actual deployment of websites is necessary. The TLS handshake required to be implemented will proceed as follows. The client generates a nonce of size 32 bytes. You may use an existing random number generator or library for this step. The client sends the nonce to the server along with a flag that is set to 1 if RSA will be used for key exchange, and set to zero if Diffie-Hellman will be used. You may randomly set this flag. The server r...

    €9 / hr (Avg Bid)
    €9 / hr Keskimäär. tarjous
    16 tarjoukset
    Write a TED Talk Loppunut left

    ...Assessment Task 2: Hints and Tips The Guidance on Written Assessments section, accessible from the left-hand menu, takes you through the process of writing written assessments, including advice on how to structure your argument and how to support it with evidence. WA2 asks you to write the script of a talk. For examples of the style you might adopt for your talk, please refer to the TedTalks or RSA presentations used in the modules or available on their websites. However, please note that the transcripts of these talks are normally longer than 1200 words, so your talk will be shorter. - What do we mean by 'specific examples of leadership' in the task description? This means we would like you to include actual, real-world examples of leadership to illustrate and/or s...

    €72 (Avg Bid)
    €72 Keskimäär. tarjous
    52 tarjoukset

    Hi, I need a cryptography programmer who can code for me an RSA cryptography system that can encode and decode files using a public and private key. I already have the working SHA-256 hash project but I need someone to help me with the RSA code using the NaCl library. I am not a cryptology expert by any means but from what I understand, the idea would be that we would hash the data and then sign the hash. This will prove that whoever generated this hash has the private key. Then you get the data that you want to verify, calculate the hash on it and then check that. If the calculated hash matches the one in the signature then the signature is valid. At this point we will have have high confidence that the data has not been changed and that it was generated by someone that h...

    €156 - €468
    Mainostettu Kiireellinen Sinetöity
    €156 - €468
    9 tarjoukset

    Hello, I need a freelancer to help confirm an address locally in Cape Town, South Africa. Further details will be provided after the proposal.

    €46 (Avg Bid)
    Paikallinen
    €46 Keskimäär. tarjous
    27 tarjoukset
    PKI infra setup Loppunut left

    We have a requirement to troubleshoot existing Public Key infrastructure and issue domain controller certificate with RSA 2048 support.

    €20 / hr (Avg Bid)
    €20 / hr Keskimäär. tarjous
    3 tarjoukset

    pythone code: def _get_encryption_data(self, username, password): url = '' r = (url, data={'valueType': 'hex'}) data = () kid = data['kid'] n = long(data['n'], 16) e = long(data['e'], 16) key = (n, e) nonce = data['nonce'] plaintext = '{}|{}|{}'.format(username, password, nonce) ciphertext = (plaintext, key).encode('hex') return { 'cipher_kid': kid, 'ciphertext': ciphertext, }

    €17 (Avg Bid)
    €17 Keskimäär. tarjous
    4 tarjoukset

    Looking for Linux expert with AWS EC2, SES, Centos, WHM, Cpanel knowledge to look into 2 issues I need resolved - I have setup SES on my AWS, and some of my emails are not going out - ECDHE-RSA-AES256-GCM-SHA384:256 CV=yes: SMTP error from remote mail server after end of data: 554 Message rejected: Email address is not verified. The following identities failed the check in region - vulnerability issue identified where 2083 port needs to be hidden (Port number leaking in URL.)

    €141 (Avg Bid)
    €141 Keskimäär. tarjous
    26 tarjoukset

    ...server that will be "ALWAYS-ON" In the event the wifi on the ANDROID phone goes off or internet unavailable, the VPN tunnel should be re-established automatically without any manual intervention. The same "always-On" VPN should nbe able to connect to a laptop with UBUNTU and establish a permanent vpn tunnel. I see there are several fields that need to be completed in the case of L2TP/Ipsec PSK and RSA I just mentioned L2TP because I noticed that PPTP vpn does not have an option for "always-on" I will need 300 tunnels set up - we will agree on naming of the ranges. I have attached screen shots of the available options on android. ONLY IF you have been able to set up "always-on" vpn for android phones should you contact me. I will need ...

    €30 (Avg Bid)
    €30 Keskimäär. tarjous
    6 tarjoukset

    Invisible CodeBuddy is a company seeking to bring the worldwide expertise of talented developers to companies and individuals looking to learn new and emerging technologies, methods, and patterns. We are looking for a light-wei...Asymmetrical Encryption works. One C# console app project for Symmetrical Encryption and one C# console app for Asymmetrical Encryption. Each console app would prompt for message and password (if necessary), print the encrypted data and then unencrypt the data (using a password if necessary). You can use SDK nuget packages for RSA and/or AES encryption. No database or cloud hosting required. Technologies: Language(s): C# Library/Framework(s): .NET 6.0, AES , RSA Please deliver the work in the following format(s): Example Back-En...

    €32 / hr (Avg Bid)
    €32 / hr Keskimäär. tarjous
    13 tarjoukset

    First create an admin module and encrypt it using file vault and algos a file is created to store a string by usin rsa and caeser algorithm

    €65 (Avg Bid)
    €65 Keskimäär. tarjous
    2 tarjoukset

    Hey there, we're looking for somebody who could create for us a software that could decrypt an XML file, take the information in it and display it, according to pictures we're going to send. The decrypted XML file contains letters in chinese, so this would also have to be translated. This can also be a web application.

    €165 (Avg Bid)
    €165 Keskimäär. tarjous
    29 tarjoukset

    For the implementation & comparison, we have selected the algorithms DES, 3DES, AES, Blowfish & RSA. For comparison, we have used files of different sizes like 25 KB, 50 KB, 1 MB, 2 MB, and 3 MB. The same input files are used for all encryption algorithms. For evaluation of the performance of various encryption algorithms, the following metrics have been chosen. Encryption time, Decryption time, Avalanche effect, Memory consumption WE REQUIRE ANY PROGRAMMING LANGUAGE CODE IMPLEMENTATION OF THESE ALGORITHMS TO COMPARE THE ABOVE-MENTIONED PARAMETERS.

    €193 (Avg Bid)
    €193 Keskimäär. tarjous
    24 tarjoukset

    For the implementation & comparison, we have selected the algorithms DES, 3DES, AES, Blowfish & RSA. For comparison, we have used files of different sizes like 25 KB, 50 KB, 1 MB, 2 MB, and 3 MB. The same input files are used for all encryption algorithms. For evaluation of the performance of various encryption algorithms, the following metrics have been chosen. Encryption time, Decryption time, Avalanche effect, Memory consumption WE REQUIRE ANY PROGRAMMING LANGUAGE CODE IMPLEMENTATION OF THESE ALGORITHMS TO COMPARE THE ABOVE-MENTIONED PARAMETERS.

    €150 (Avg Bid)
    €150 Keskimäär. tarjous
    6 tarjoukset

    ...have code and SSH and sshCommand (gitlab is working fine, not worried about those keys) really should be quick and easy here Got my keys and all should be fine but have sections working fine and others perhaps syntax issues. Can share my Jenkinsfile and perhaps we can do desktop share? using private / public key - (using withCredentials) got all 3 working when a "friend" used putty to export RSA ? I am on mac / linux - how can I do this? What is my solution to roll this out to many Targets? Doing a training and wants be to add "Execute shell script on remote host using ssh" However, the host can not be added as "SSH hosts is not available in Manage Jenkins? Any thoughts? Let me know your thoughts and any questions While this is hourly; th...

    €7 / hr (Avg Bid)
    €7 / hr Keskimäär. tarjous
    5 tarjoukset

    Looking for marketers to set up and manage PPC Marketing for niche online clothing store, Must have expertise in Google Shopping Campaigns, Google DSA, Google RSA, FB DPA and Instagram Ads

    €106 (Avg Bid)
    €106 Keskimäär. tarjous
    18 tarjoukset
    RSA Encryption Loppunut left

    I need a RSA Encryption software using Tkinter Framework. It should contain options for uploading a text file and able to view and encrypt the text using RSA.

    €162 (Avg Bid)
    €162 Keskimäär. tarjous
    28 tarjoukset

    ...server and import the SSL into Chrome and I was able to make the whole thing work once but now it doesn't work anymore. I undid something somewhere and now I am stuck and have limited time. I am on Rocky Linux 8 (same as Red Hat). Tasks involved: - Correct the steps outlined below so that I can replicate and apply by my side 1- [GENERATE AND SIGN CERTIFICATE] % cd /usr/local/lsws Generate an RSA private key of size 2048: % openssl genrsa -des3 -out 2048 Generate a root certificate: % openssl req -x509 -new -nodes -key -sha256 -out To check just created root certificate: % openssl x509 -in -text -noout Create a private key to be used during the certificate signing process: % openssl genrsa -out 2048 Use the private key to create

    €115 (Avg Bid)
    €115 Keskimäär. tarjous
    9 tarjoukset

    Looking for expert in memory forensic and openssl and RSA crypto. If you don't know c or assembly don't bid

    €193 (Avg Bid)
    €193 Keskimäär. tarjous
    10 tarjoukset

    This goes to anyone who has knowledge in secure software and has experience dealing with RSA public and private keys. You will need to customize the supplied json order file to provide information and then encrypt that json order using aes encryption with the supplied ke and IV then base64 encode the result. However, you may need to convert the message to a byte array from strings to work with the encryption algorithm and generate a message digest using SHA512. I will provide additional files and further instructions upon contacting me. Please also provide your budget first as I am on a strict budget, thank you.

    €17 (Avg Bid)
    €17 Keskimäär. tarjous
    2 tarjoukset
    RSA Cryptography Loppunut left

    Need an expert who is excellent with cryptography.

    €31 (Avg Bid)
    €31 Keskimäär. tarjous
    8 tarjoukset

    Looking for expert in memory forensic and openssl and RSA crypto. If you don't know c or assembly don't bid

    €130 (Avg Bid)
    €130 Keskimäär. tarjous
    1 tarjoukset

    Mobile phones are considered to be the most common communication devices in history, mobile phones are not only used...security solution, which can be used to secure the mobile communications. ABC company have been proposed; server-based framework public key cryptography solution to secure the mobile communications. Third party servers were used to check the certificates, authenticating the communicating parties, key distribution, etc. The proposed framework consists two type of ciphers; i) Public key Cryptosystem (RSA) and, ii) decrypt messages through the digital signature. In operating system; there are three procedures Schedule activities inbetween CPU and RAM to be considered in order to apply the secure communication, Long-Term Scheduler, Short-Term Scheduler, and Medium-Term ...

    €42 (Avg Bid)
    €42 Keskimäär. tarjous
    13 tarjoukset
    file decryption Loppunut left

    Recover the plaintext from given files (ciphertext), Mono-alphabetic substitution, Poly-alphabetic shift, Textbook RSA

    €96 (Avg Bid)
    €96 Keskimäär. tarjous
    26 tarjoukset

    Mono-alphabetic substitution, Poly-alphabetic shift, Textbook RSA

    €15 (Avg Bid)
    €15 Keskimäär. tarjous
    6 tarjoukset

    Mono-alphabetic substitution, Poly-alphabetic shift, Textbook RSA

    €27 (Avg Bid)
    €27 Keskimäär. tarjous
    8 tarjoukset

    Mono-alphabetic substitution, Poly-alphabetic shift, Textbook RSA

    €18 (Avg Bid)
    €18 Keskimäär. tarjous
    6 tarjoukset

    Mono-alphabetic substitution, Poly-alphabetic shift, Textbook RSA

    €14 (Avg Bid)
    €14 Keskimäär. tarjous
    4 tarjoukset

    1) Describe how to implement the following queries in MapReduce: SELECT , a.Last...MapReduce engine (the execution layer) have to do to respond to the node failure? Assume that there was a job in progress at the time of the crash (because MapReduce engine only needs to take action if a job was in progress). Where does the Mapper store output key-value pairs before they are sent to Reducers? Can Reducers begin processing before Mapper phase is complete? Why or why not? Repeat the RSA computation examples by a) Select two (small) primes and generate a public-private key pair. b) Compute a sample ciphertext using your public key c) Decrypt your ciphertext from 4-b using the private key d) Why can’t the encrypted message sent through this mechanism be larger than the value ...

    €186 (Avg Bid)
    €186 Keskimäär. tarjous
    1 tarjoukset

    Suosituimmat rsa -yhteisöartikkelit