Sha 256 decryption työt

Suodata

Viimeisimmät hakuni
Suodatusperuste:
Budjetti
asti
asti
asti
Tyyppi
Taidot
Kielet
    Työn tila
    2,000 sha 256 decryption työtä löytyi, hinnoittelu EUR

    ...upload audio files with an attached encrypted key. These files can be securely sent to another user who can download and decrypt the file using the same application. The app will integrate with our existing Shopify website for seamless user experience and functionality. Consultation Scope: - Secure File Upload: Enabling users to upload audio files with embedded encrypted keys. - Encryption & Decryption: Implementing robust encryption methods to ensure the secure attachment of keys to audio files. - File Sharing Facilitating the secure transfer of files between users within the app. - **Bluetooth Key Sharing:** Allowing the encrypted key to be shared via Bluetooth between devices. - Cross-Platform Development: Ensuring compatibility and seamless functionality on both iOS ...

    €1379 - €2757
    Sinetöity
    €1379 - €2757
    93 tarjoukset
    Laravel PHP Developer for Custom Web App 6 päivää left
    VARMENNETTU

    Hey you! Do you have more than 6 years as a Laravel Developer? Can you prove it? Can you prove/provide evidence of what you have personally done as a developer? Does compliance to high security standards, encyption at rest, encryption in transit, AES 256, SHA 256 mean something to you? Are you willing to join an existing project? Are you willing to work for a flat monthly salary? Then this job may be for you. Our team is hard at work building a web application. We currently need an additional developer to assist with some key activities. You will be assigned duties by our Application Team Leader. Shoot us a quick message if interested. No agencies or middle men please.

    €6 / hr (Avg Bid)
    €6 / hr Keskimäär. tarjous
    75 tarjoukset

    ...in need of a seasoned VB6 professional to assist with encryption and compression functionalities within my project. Key Requirements: - Task: The primary task is to implement encryption and decryption, along with compression and decompression, in the existing project. - Data: The encryption and decryption will primarily focus on text data. - Implementation: I specifically require the use of AES, Huffman, Inflate and Deflate, and GZIP mechanisms for the encryption and decryption process. Ideal Skills and Experience: - Extensive Experience: Strong experience with VB6, particularly in encryption, decryption, compression, and decompression. - Specific Knowledge: Proficiency in implementing AES, Huffman, Inflate and Deflate, and GZIP in VB6. - Industry Best Prac...

    €51 (Avg Bid)
    €51 Keskimäär. tarjous
    10 tarjoukset

    Project: Configuration of the eCash node and mining pool The Pool will only be...(LocalHost). 2. Installation and configuration of ckpool mining software on the same server. 3. Configuring ASICs to connect and mine through the pool. 4. Ensure continuous connectivity and proper functioning of the eCash node and mining pool. 5. Troubleshooting issues related to network connectivity and hardware configuration. Requirements: - Proven experience with cryptocurrency mining, especially SHA-256. - Knowledge in installing and configuring cryptocurrency nodes and mining pools. - Ability to troubleshoot network connectivity and hardware configuration issues. - Familiarity with eCash (XEC) is an advantage. Submit proposals with details about your experience, including examples of simil...

    €1091 (Avg Bid)
    Kiireellinen
    €1091 Keskimäär. tarjous
    6 tarjoukset

    In this pro...project, I'm looking for an expert who can provide an effective zero-click exploit aimed at extracting personal data. This won't involve any unauthorized access but would serve as a tool for understanding my system’s vulnerabilities better and further strengthen it. Technical Proficiency Required: - Understanding of zero-click exploits and system vulnerabilities - Experience in encryption and decryption - Expertise in handling sensitive information Please note that the environment for deployment of this exploit is yet to be determined. Therefore, flexibility and adaptability are highly valued. Note: This project strictly disapproves and discourages any form of illegal activity, thus only candidates who are ethical and responsible should apply. RANS...

    €339 (Avg Bid)
    €339 Keskimäär. tarjous
    17 tarjoukset

    ...setup. I would like to have an efficient algorithm implemented that is capable of converting existing hashing power to mine using the SHA-256 algorithm. This would allow me to increase the diversity of my mining operations. Key requirements for this project include: - Developing an algorithm that can convert hashing power automatically - Primary focus on SHA-256 algorithm - Emphasis on compatibility across different systems rather than speed or energy efficiency Ideal candidates for this project will have a strong background in algorithm development, specifically relating to cryptocurrency mining. Familiarity with different mining algorithms, particularly SHA-256, is absolutely essential. Lastly, having prior experience in developing high comp...

    €550 (Avg Bid)
    €550 Keskimäär. tarjous
    25 tarjoukset

    I'm seeking a skilled professional to create a solution designed specifically for encryption and decryption of cipher text. This cryptography project will focus strictly on the secure communication and data encryption of this particular type of text data. Ideal Skills and Experience: - Strong background in cryptography - Proven experience with cipher text - Familiarity with various encryption algorithms Please note, the specific algorithm to be used wasn't stated. However, your experience and advice will be crucial in determining the most suitable option. I would greatly value your expertise in suggesting the best route. Looking forward to your proposals.

    €18 (Avg Bid)
    €18 Keskimäär. tarjous
    1 tarjoukset

    ...the encryption and decryption used in major UPI apps, as well as integrating with multiple UPI payment providers and banks. The main features I'm aiming to incorporate are: - Check balance: The application should be able to retrieve and display the user's account balance. - Register: Provide a seamless registration process for new users. - Check pending UPI requests: Show the user any pending requests that require their action. - Approve payment requests: Allow users to approve UPI payment requests. - List of bank added: Display a list of banks that have been added to the user's account. - Data store/retrieve should be in json. -use httpclient in sending api requests. Key Points: - Encryption: You'll need to understand and replicate the encrypti...

    €1083 (Avg Bid)
    €1083 Keskimäär. tarjous
    28 tarjoukset

    I'm in need of a C# program that can hash files as quickly as PowerShell does. The program should be able to hash image files and all other types of files at the same speed, while utilizing the SHA-256 hashing algorithm. Additionally, it would need to read and write data efficiently. Key requirements: - Develop a C# program to hash files. - Implement the SHA-256 hashing algorithm. - Ensure the program reads and writes data smoothly.

    €23 (Avg Bid)
    €23 Keskimäär. tarjous
    2 tarjoukset

    I need a C# program that hashes text strings using SHA-256 hashing algorithm. The current program I have was designed to hash data, but I've noticed it does so in a different order than PowerShell. This is problematic for my workflow, as I need the two to hash data in the same order for consistency. Key Requirements: - Make the C# program hash data in the same order as PowerShell using SHA-256 - Ensure the program is efficient and secure - Document the changes made for future reference Ideal Skills: - Proficient in C# programming - Expertise in working with hashing algorithms, especially SHA-256 - Prior experience with data consistency issues - Strong understanding of security protocols and best practices Please include your relevant exper...

    €42 (Avg Bid)
    €42 Keskimäär. tarjous
    18 tarjoukset

    I require a specialist to build a solution that validates the authenticity of hashed data in video format. The key focus of this project demands: - Experience in hashing algorithms, notably SHA-256 - Proficiency in data authenticity verification - Familiarity with video formats, particularly MP4 - An understanding of how to match video-recorded audit logs with original hashed data It's crucial to know if the hash data from the video recording matches the original hash of the audit logs for data authenticity purposes. Please note that the audit logs are text-based and believed to contain a hash of the original file. Your role is to confirm this authenticity. This task requires a comprehensive understanding of data security and integrity checks. If you have prior exper...

    €84 (Avg Bid)
    €84 Keskimäär. tarjous
    13 tarjoukset

    I am seeking an experienced Django developer who can design a fast-operating framework with high-grade security features. The major areas of focus in this job will include: 1. User authentication and robust data modeling and database integration. 2. API development for encryption and decryption activities. 3. Architecture designed for speed, this includes fast page load times, quick response to user interactions, and high data processing speed. 4. Advanced security measures that include encryption of Private Messages (PMs) and attachments. The PM recipient should be able to log on to the site to read these. 5. A tracking system to monitor all user logins, including capturing images during logins and transactions with the help of facial recognition software. 6. Ensuring no sharing...

    €368 (Avg Bid)
    €368 Keskimäär. tarjous
    81 tarjoukset
    Trophy icon Humorous T-shirt Design Loppunut left

    I'm seeking a skilled graphic designer to create a funny, brightly colored T-shirt design that features humans. The aim is to create an engaging, humorous design that is sure to catch the attention. Key Requirements: - Excellent skills and experience in gra...particularly with T-shirt design. - Ability to create eye-catching, humorous designs. - Proficiency in handling bright colors and human figures in design. - Good sense of humor to incorporate wit in the design. The ideal candidate will have a keen eye for detail and ability to translate ideas into creative graphics. It needs to have my company name and phone number, Custom Pro Services llc 256-399-7140. I want it to say something like, i got plastered by Custom Pro Services. We are a swimming pool plastering and ...

    €93 (Avg Bid)
    Taattu
    €93
    141 työtä

    I'm looking for a professional translator to convert an English written content to Italian. The timeline for this project is extremely tight and I need a freelancer who can deliver quality results promptly. Key Requirements: - Translate English content into Italian: You must have excellent command of both languages with experience in content translation. - Experience with Pagination: The conten...Skills and Experience: - Proven experience in English to Italian translation, specifically in the context of pagination. - Ability to work under tight deadlines without compromising on quality. - Strong communication skills to provide regular updates on the progress of the project. Please provide a portfolio of your previous translation work and any relevant experience with pagination. P...

    €342 (Avg Bid)
    €342 Keskimäär. tarjous
    64 tarjoukset

    As the owner of a web-based platform, I'...posing the problem remains unclear due to lack of further information. Therefore, I need an expert who possesses a deep understanding of payment processing systems, particularly Google Pay, and who is proficient with cryptographic systems on the web platform. Your tasks will include the following, depending on the discovered problem: - Debugging and resolving encryption problems - Sorting out decryption issues - Overcoming challenges related to key generation and management Despite the puzzle-like nature of the job, a meticulous and patient troubleshooter with strong experience in the field will find this task enjoyable and well within their capabilities. I look forward to hearing from you if you are up for this challenging yet ...

    €69 (Avg Bid)
    €69 Keskimäär. tarjous
    11 tarjoukset

    I'm looking for a skilled developer to implement DTLS in C for secure communication within a tight deadline of two weeks. Key project requirements: - Implement DTLS in C: The primary goal of this project is to intro...Security Background: Strong understanding of encryption protocols and data integrity is necessary. - Time Management: Ability to work under strict deadlines and deliver high-quality results promptly. Required Skills: Proficiency in C programming language Experience with UDP socket programming Knowledge of DTLS (Datagram Transport Layer Security) protocol Ability to implement encryption and decryption mechanisms Familiarity with video streaming or live feed protocols and techniques" Please include examples of similar projects you have successfully complet...

    €478 (Avg Bid)
    €478 Keskimäär. tarjous
    8 tarjoukset

    I require a competent programmer to create a RSA (South African) drivers license decryption class library in C#. The library needs to take encoded strings (Barcode scan) as input and generate a decoded file as output. Key requirements: - Extensive experience with C# - Capability to handle encoded strings - Generate a decoded file as required output as a C# model class that is easy to use and contain all required data. - The library need to work within a .NET Core 3.1 API. - A detailed explanation of how to use use this library needs to be provided. PLEASE NOTE: The focus is on creating a reliable and efficient library, hence a solid understanding of performance optimization is necessary. A strong grasp

    €131 (Avg Bid)
    €131 Keskimäär. tarjous
    25 tarjoukset

    I’m in need of an intermediate-level C++ coder for a bitcoin mining initiative. The successful applicant must be comfortable with coding for solo mining. This project doesn't require expertise in multi-threading or pool mining, but a firm grasp on the creation and development of bitcoin mining algorithms is essential. An understanding of SHA-256 algorithm implementation is a plus, though not mandatory. Looking forward to your bids, and to our potential collaboration.

    €119 (Avg Bid)
    €119 Keskimäär. tarjous
    18 tarjoukset

    ...developing encryption, decryption, and key generation functionalities. Key Project Requirements: - Extensive knowledge and application of Cryptography - Proficiency in the C programming language - Experience in generating SHA keys The Cryptographer will perform the following tasks: 1. Encryption and Decryption: You will write code that facilitates both encryption and decryption processes using the AES (Advanced Encryption Standard) algorithm. 2. Key Generation: Involves the creation of a safe and secure key generation mechanism utilizing SHA. You should prioritize key security to guarantee the confidentiality and integrity of the encrypted contents. 3. File Support: The coded software should accept file inputs only, handling and processing encry...

    €16 (Avg Bid)
    €16 Keskimäär. tarjous
    3 tarjoukset

    ...both a 3D and flat icon for brand consistency. I need an icon to use in some cases since my logo is so big. The requirements include: - Creating a 3D icon version utilizing the original logo colors - Designing a flat icon version using the same color scheme - Delivering the final icons in PNG, AI, SVG, and JPG formats Here's an example of the flat icon - Here's the 3D icon - Here's my actual logo files - The ideal freelancer for this

    €71 (Avg Bid)
    €71 Keskimäär. tarjous
    171 tarjoukset

    I need a modern architectural design for a house with a plot size of 32x72, covering 256 square yards. The ground floor should include a double-height living area, three bedrooms, a kitchen, dining area, and a drawing room. The first floor should feature three additional bedrooms. The project should envelop both interior and exterior designs, along with 3D visualizations. Specifications: - Style: Modern Architecture - Theme: Modern Interior - Color Palette: Latest Trending Styles Ideal skills and experience for the job: - Bidders should have proficiency in modern architecture and interior design - Experience in creative space utilization in residential layouts - Expertise in 3D visualization of plans and designs - Awareness of latest color trends in interior design This is a fa...

    €130 (Avg Bid)
    €130 Keskimäär. tarjous
    45 tarjoukset

    As an expert in Google Cloud services and security configurations, you'll be tasked to: - Set up a Load Balancer on Google Cloud Engine for a Google App Engine project in a two-hour live session via Google Meet with screen sharing....Load Balancer on Google Cloud Engine for a Google App Engine project in a two-hour live session via Google Meet with screen sharing. - The main goal is to increase the security of the site. - You're expected to disable TLS 1.0 and 1.1 protocols, and enable both TLS 1.2 and TLS 1.3 versions in the project for optimal security. - Also, certain encryption algorithms, specifically RSA, AES 128, AES 256, CBC and GCM need to be disabled. The ideal candidate must have extensive experience with GCE and advanced understanding of TLS protocols and en...

    €49 (Avg Bid)
    €49 Keskimäär. tarjous
    4 tarjoukset

    I'm looking to integrate C# code for RSA encryption within the framework of the Ayushman Bharat Digital Mission. Key specifications include: - The encryption is needed for text data - It requires RSA Encryption - Key size requirement for the encryption is not provided, but guidance can be found at this helpful link: The ideal candidate for this project has a strong knowledge of C# and experience in implementing RSA encryption. They should be able to handle sensitive data and ensure maximum security standards.

    €69 (Avg Bid)
    €69 Keskimäär. tarjous
    14 tarjoukset

    More details: What is the primary reason for encrypting the Raspberry Pi 4 OS and inside files? Protect sensitive data What encryption level do you require for your sensitive data? 256-bit encryption Are there specific files or data types that need to be prioritized in the encryption process? Program and System Files

    €143 (Avg Bid)
    €143 Keskimäär. tarjous
    8 tarjoukset

    I need a custom code component created for my PowerApps Canvas App. Key Requirements: - The component should decrypt static text encrypted with AES or any other simple algorithm Deadline: - I need this project completed ASAP. Ideal Skills and Experience for the Job: - Strong experience with C# programming, Java script or any language that we will use to achieve the goal - Prior...- The component should decrypt static text encrypted with AES or any other simple algorithm Deadline: - I need this project completed ASAP. Ideal Skills and Experience for the Job: - Strong experience with C# programming, Java script or any language that we will use to achieve the goal - Prior experience with creating code components for PowerApps Canvas Apps. - Proficiency in encryption/decryption...

    €151 (Avg Bid)
    €151 Keskimäär. tarjous
    39 tarjoukset
    pixel art de escudo Loppunut left

    hacer el escudo en 256 y otro de 128 pixel

    €39 (Avg Bid)
    €39 Keskimäär. tarjous
    1 tarjoukset

    I am looking for a Flutter developer to create a comprehensive PDF package (not APP). - The package should include functionality for: 1.) PDF encryption and decryption 2.) PDF compression 3.) Splitting PDF into multiple PDFs 4.) Merging multiple PDFs 5.) Watermarking PDF 6.) PDF validity and protection info 7.) Add page no. to the PDF 8.) Change PDF page size IMPORTANT: Do not use any underlying technology which requires AGPL-3.0 license or any other license which asks for fees for commercial use. Platform Support: - The Flutter package should be able to work seamlessly across both iOS and Android platforms. Exhaustive documentation will be required for the package. Example flutter package (for reference only): Payments will be done in phases

    €666 (Avg Bid)
    €666 Keskimäär. tarjous
    59 tarjoukset

    I need help recovering encrypted documents from my partially operational server. The server is currently inaccessible, but I have a complete backup of the affecte...recovering encrypted documents from my partially operational server. The server is currently inaccessible, but I have a complete backup of the affected files. The files are encrypted, and I need them recovered in their original format. Key Requirements: - Specialized in encrypted file recovery - Proficiency in data recovery from partially operational servers - Experience with document recovery and decryption It's important that the freelancer has the necessary skills and tools to recover the encrypted documents from my server without causing any further damage. The recovered files should be in their original, unco...

    €110 (Avg Bid)
    €110 Keskimäär. tarjous
    5 tarjoukset

    ...Bitcoin Libraries for Transaction Validation: You must not use any Bitcoin-specific libraries or frameworks that automate transaction validation processes. The intent of this task is for you to implement the validation logic manually. - Permissible Libraries: The use of standard cryptographic libraries, such as secp256k1 for elliptic curve cryptography, and standard hashing libraries (e.g., for SHA-256) is allowed and encouraged. These libraries are essential for implementing the cryptographic underpinnings of bitcoin without reinventing the wheel. - Implement the Mining Algorithm Yourself: You are required to implement the mining algorithm on your own. This includes creating a way to correctly form a block header, calculate the hash, and meet the task of finding a hash be...

    €10 (Avg Bid)
    €10 Keskimäär. tarjous
    3 tarjoukset

    I am in need of a professional who can assist me in unlocking and editing the text content of my PDF document. My project requirements in detail are: 1. **PDF Unlocking**: - Remove the password from my PDF to grant access for editing. 2. **Text Editing**: - Modify the existing text in the document. The changes to be made will be provided.Sw...PDF to grant access for editing. 2. **Text Editing**: - Modify the existing text in the document. The changes to be made will be daviradu with someone with a score of 220 The ideal freelancer for this project should be experienced with PDF editing tools, have a strong attention to detail and excellent command of the English language. Knowledge of various encryption and decryption techniques would be highly beneficial.

    €17 (Avg Bid)
    €17 Keskimäär. tarjous
    48 tarjoukset
    Log FIle Decryption Loppunut left

    I need to decrypt a crypted client-side log file (.txt) of a desktop application The goal is to understand the logic behind encryption and write a simple script that translates data in human-readable text. I have no idea on how encryption is made. The application has a client-server architecture, and could have restrictions based on user location. So, you will likely need to use a vpn or vps to test. Source code must be delivered at the end of contract, better if logic behind script is directly explained via call (not mandatory). Preferred language for scripts is p1ton (volutanry wrong to not received automated answers), but I am open to other language if there are clear benefits.

    €124 (Avg Bid)
    €124 Keskimäär. tarjous
    60 tarjoukset

    I am in urgent need of a decryptor tool to recover my files that have been encrypted by a virus. My all files are encrypted with ".mkp" Unfo...all files are encrypted with ".mkp" Unfortunately, I do not have any backups of these files, so the tool needs to be able to decrypt them directly. Key Requirements: - The tool must be compatible with Windows OS - It should be able to quickly and effectively decrypt files with the .mkp extension Experience Needed: - Proficiency in software development and security - Experience in creating decryption tools is highly preferred - Ability to work quickly and effectively to meet the immediate deadline Please only bid on this project if you are confident in your ability to meet these requirements and can deliver the tool w...

    €11 (Avg Bid)
    €11 Keskimäär. tarjous
    1 tarjoukset

    I'm seeking an expert who can decrypt an AES encrypted .cap file. The file contains encrypted data I need to access for educational purposes. Key requirements include: - Expertise in decrypting AES encrypted files - Ability to efficiently and securely recover the data from the .cap file - Strong commitment to data privacy and confidentiality Please provide examples of similar work you have done in the past, and outline your proposed approach to this task.

    €17 / hr (Avg Bid)
    €17 / hr Keskimäär. tarjous
    15 tarjoukset

    I am seeking an expert who can reverse engineer an APK file. the main idea is to know how to call the API from Postman as the API request has signature and the response is encrypted. the signature and the decryption happen inside the APK APK Link: This APK is coded in Java and your primary task will be to decipher the APK's code structure for a comprehensive understanding. Note that documentation is not required after reverse engineering. Experience in Java and advanced reverse engineering techniques are primary skills that you should possess. Good communication will be an important advantage because I might need to understand complex operations during the process. Thanks for considering this project.

    €438 (Avg Bid)
    €438 Keskimäär. tarjous
    63 tarjoukset

    I need someone to calculate and show me simply the difference between different computer systems: 1) standard 32 bit computer 2) standard 64 bit computer 3) 32 qubit quantum computer 4) standard 256 bit super computer 5) standard 1024 bit super computer 6) a hypothetical system that uses hex instead of bits I will give 2 simple calculations and i simply need to understand how many combinations ie how long it would take to perform simple calculations for each of the 6 systems. Will lead to more work

    €88 (Avg Bid)
    €88 Keskimäär. tarjous
    30 tarjoukset

    ...and project development process. • A graphical interface for file encryption and decryption. • Important Implementation Tips: In your implementation, please adhere to the following guidelines: 1. Your program should accept any file type as input (e.g., .docx, .jpg, .xlsx, etc.). 2. Depending on your chosen encryption algorithm, the program must split the input file into appropriate blocks for encryption. 3. Encrypt the file's extension and append it to the last block of encrypted data. 4. Add a new, algorithm-specific extension to the encrypted file. For example, if you use an algorithm named "X", you might append ".bwf" or another unique extension to the encrypted files. 5. Ensure that your decryption process accurately recovers t...

    €108 (Avg Bid)
    €108 Keskimäär. tarjous
    43 tarjoukset

    ...algorithm and project development process. • A graphical interface for file encryption and decryption. • Important Implementation Tips: In your implementation, please adhere to the following guidelines: 1. Your program should accept any file type as input (e.g., .docx, .jpg, .xlsx, etc.). 2. Depending on your chosen encryption algorithm, the program must split the input file into appropriate blocks for encryption. 3. Encrypt the file's extension and append it to the last block of encrypted data. 4. Add a new, algorithm-specific extension to the encrypted file. For example, if you use an algorithm named "X", you might append ".bwf" or another unique extension to the encrypted files. 5. Ensure that your decryption process accurately recover...

    €121 (Avg Bid)
    €121 Keskimäär. tarjous
    49 tarjoukset

    I'm seeking an expert in Python to develop a decryption utility tool. The purpose of this tool is to decode encrypted messages, binary files, and encoded data, helping me simplify and expedite data analysis tasks. The ideal candidate will: • Have substantial experience with Python programming. • Be familiar with various encryption algorithms, notably AES, RSA and DES. Your expertise in these will be key to the successful creation of this utility. • Be committed and focused, as the tool must be completed ASAP. Looking forward to receiving bids from suitable and interested freelancers. Please, when bidding, include any relevant experience and examples of similar projects.

    €19 (Avg Bid)
    €19 Keskimäär. tarjous
    76 tarjoukset

    I need an ETL developer to streamline and automate an existing manual process. This includes: - Transferring two encrypted *. files from a source server to a local machine. - Decrypting these files into *.csv format. - Running SQL on one file and a PowerShell command on the other file to create a staging table. - Setting up a Microsoft SQL Server...- Setting up a Microsoft SQL Server database into read-write mode from read-only. - Reverting the database back to read-only upon task completion. - Sending a report to the user upon task completion. Ideal skills for this job include advanced SQL, PowerShell, and ETL development. Familiarity with read/write permissions on Microsoft SQL Server and experience with data transfer and encryption/decryption processes are also highly benefici...

    €31 (Avg Bid)
    €31 Keskimäär. tarjous
    17 tarjoukset

    I am looking for a specialist to make a custom encryption for my laptop's UEFI firmware at runtime and decr...addressing security vulnerabilities. Here's what I am looking for: - A comprehensive understanding of kali linux as that is the targeted operating system for this project. - Proficiency in dealing with UEFI firmware. Specifically, if you have experience working with the firmware on the Lenovo Ideapad Slim 3 15IIL05, that would be preferable. - Prior experience with firmware encryption and decryption. - An in-depth understanding of mitigating potential security vulnerabilities. With your help to boost my system's security, I look forward to granting only legitimate parties necessary access to my laptop. Please apply if you have the skills and experience to ...

    €1173 (Avg Bid)
    Mainostettu
    €1173 Keskimäär. tarjous
    6 tarjoukset

    I need an expert cryptographer capable of working with custom encryption used for game client files. Specifically, your task will involve the following: - Decrypting game configuration files and game asset files. These two types of files are crucial to the completion of the project. - Explain what is the method used for encrypting the files Ideal candidates for this job would have proven experience in decrypting custom game client files, asset extraction, and game behavior analysis. Please provide a detailed explanation of how you plan to approach this task in your bid.

    €183 (Avg Bid)
    €183 Keskimäär. tarjous
    42 tarjoukset

    I'm currently using PERL 5.10 system and requires a proficient expert to aid in modifying how passwords are hashed in my system. Initially, we employed SHA-256 but we're looking to switch to PBKDF2. Ideal Skills and Experience: - Proficient in PERL 5.10 - Familiarity with SHA-256 and PBKDF2 hashing methods - Prior experience in password re-hashing Task Objectives: - Identify current SHA-256 hashing method in the system - Modify hashing method to use PBKDF2 instead - Validate successful implementation of the PBKDF2 hashing method The project necessitates a strict focus on security and confidentiality given its sensitive nature.

    €12 (Avg Bid)
    €12 Keskimäär. tarjous
    26 tarjoukset

    ...for Transaction Validation: You must not use any Bitcoin-specific libraries or frameworks that automate transaction validation processes. The intent of this challenge is for you to understand and implement the validation logic manually. Permissible Libraries: The use of standard cryptographic libraries, such as secp256k1 for elliptic curve cryptography, and standard hashing libraries (e.g., for SHA-256) is allowed and encouraged. These libraries are essential for implementing the cryptographic underpinnings of bitcoin without reinventing the wheel. Implement the Mining Algorithm Yourself: You are required to implement the mining algorithm on your own. This includes creating a way to correctly form a block header, calculate the hash, and meet the challenge of finding a hash...

    €12 / hr (Avg Bid)
    €12 / hr Keskimäär. tarjous
    7 tarjoukset

    ...Authentication methods, Secret management, and Encryption/Decryption. Key tasks include: To use and operate Vault, we should create a document that shows: -Are there circumstances that would require the Vault master key, and its derived keys to be regenerated? Is there control over the encryption algorithm / primitives selected and used by Vault? How, when and why a secret stored by vault should have its encryption key regenerated? How can vault policies be created? What is the minimum standard for a policy we should be aiming for, e.g. TTL? - Documenting LDAP and token-based authentication methods. - Detailing the process of managing Database credentials, API keys, and Certificates using Vault. - Understanding and writing about the encryption/decryption fundamentals ...

    €16 / hr (Avg Bid)
    €16 / hr Keskimäär. tarjous
    12 tarjoukset

    ...developer to create a decryption application compatible with Linux, specialized in handling Ioncube-encrypted files. The ideal candidate will leverage their robust coding skills and experience to develop a system capable of decrypting multiple files simultaneously. Key functionalities should include: - Compatibility with Linux OS - A user-friendly interface that supports drag-and-drop functionality - Incorporating a progress bar to track the decryption process Proficient experience with Linux platform, a strong understanding of Ioncube encryption, and the ability to create interactive user experiences are required for this project. Your proficient command in innovative coding methods and problem-solving skills should be geared towards achieving an efficient and reliable...

    €100 (Avg Bid)
    €100 Keskimäär. tarjous
    23 tarjoukset

    For this task, I require a skilled developer with solid background in Docker and Kafka. The task at hand is to work on an existing Docker Compose script for a Kafka application centered around authorization. Key Requirements: - Incorporating SASL/SCRAM authentication mechanism. - Focusing on the SCRAM-SHA-256 version for Kafka authentication. A deep understanding of the listed technologies and profound experience in adding security features to Kafka applications will be a significant advantage. Secure, reliable streaming is the goal. Therefore, the freelancer needs to be knowledgeable about how SASL/SCRAM authentication enhances Kafka application's security. Only bid if you are highly confident you can deliver my exact requirement.

    €25 (Avg Bid)
    €25 Keskimäär. tarjous
    4 tarjoukset

    Here is a NodeJs package that is used to decrypt media files received on WhatsApp messages for our clients. This works we...disk. This takes a lot of memory for large files. We need to modify this script so as to return stream instead of data. We should be able to use the stream in a pipeline/pipe. I have a small NodeJS script with above code, that you should take a look at and let me know if you can do it. To accomplish this, you should definitely have: - Experience with advanced NodeJS development and general decryption algorithm - Try not using other external packages, if possible - Ask me for the nodejs project in private message - Should be easy task for someone experienced Thank you in advance for your interest in my project and your bids.

    €43 (Avg Bid)
    €43 Keskimäär. tarjous
    7 tarjoukset