Find Jobs
Hire Freelancers

RFID program in vb.net

£20-250 GBP

Peruutettu
Julkaistu noin 9 vuotta sitten

£20-250 GBP

Maksettu toimituksen yhteydessä
Design and develop a host cryptography software application in VB.Net that will be used to encrypt and decrypt jpeg image files for Windows based operating systems. The software application must require login authentication using both traditional user login and password, but also RFID enabled authentication. Encryption and decryption of files will be applied using cryptographic keys protected and stored on RFID an RFID tag. The software must allow a user to log-in using a traditional username and password. This username and password must be verified by a corresponding username and password MD5 hash stored on a RFID tag. Once login has been authenticated, the user will be able to select files from their computer (or connected removable drives) to encrypt or decrypt using AES encryption. The software must employ the CFB cipher-mode of AES encryption. The software must the user to initialise a new RFID tag for login and IV verification. The initialise process will generate an MD5 hash of the username and password combines as one string and store it into the first four blocks of the RFID tag. When a file is encrypted using the AESCryptoServiceProvider in VB.NET, a random 16 byte initialisation vector (IV) is automatically generated. The IV (Initialisation Vector) has to be specified along with the cryptographic encryption key in order to encrypt/decrypt a file. To avoid having to specify the IV’s and the cryptographic pass-key every time a file is to be decrypted, the 16-byte IV must also be stored in the RFID tag. When a file is to be encrypted, the user must select a cryptographic pass-key (a string value); the automatically generated IV must be stored in the RFID tag. When this file is to be decrypted, the user must enter the valid pass-key and the corresponding IV must be read out of the tag in order to complete the file decryption. The 16-bit IV for the encrypted file must be stored in the next four blocks of the tag. The diagram below shows the memory structure of the RFID tag and location where the login credential MD5 hash and IV are stored respectively. The core functionality of you software must include: Establish and manage a serial communications link in order to communicate with the RFID reader. Allowing to user to initialise a RFID tag by storing the MD5 hash of the username and password (combined). Verify the username login credentials by comparing the entered username and password at the log-in stage with the username and password MD5 hash stored in the RFID tag. Once successfully logged in: the user must be able to select a saved jpeg file on the host computer and encrypt it using AES encryption; CFB cipher-mode AES encryption must be employed. The encrypted file must be saved to a drive on the host computer. The automatically generated IV must be saved to the RFID tag, the user must be able to select a saved decrypted jpeg file on a drive of the host computer and decrypt it saving the decrypted file to back to the computer. In order to successfully complete the decryption process, the associated IV must be read from the RFID tag. Once any cryptographic operations are complete, the user must be able to log-off and automatically close the serial port connection used to communicate with the RFID reader. Advanced functionality may include: the saving of multiple IV’s for the encryption/decryption of multiple files storing a record of IV’s and associated filenames if encrypted files on the RFID tag Resources Provided Visual [login to view URL] FEIG ID RW02 RFID Desktop Reader FEIG ID RW02 RFID Emulator FEIG ID RW02 RFID Communication Protocol Hitag1 Transponder(s)
Projektin tunnus (ID): 7136315

Tietoa projektista

3 ehdotukset
Etäprojekti
Aktiivinen 9 vuotta sitten

Haluatko ansaita rahaa?

Freelancerin tarjouskilpailun edut

Aseta budjettisi ja aikataulu
Saa maksu työstäsi
Kuvaile ehdotustasi
Rekisteröinti ja töihin tarjoaminen on ilmaista
3 freelancerit tarjoavat keskimäärin £287 GBP tätä projektia
Käyttäjän avatar
Hello sir, I will do my best to achieve your expectation. I have a 3+ years of experience working with vb.net. Please message me for further discussions. Thank you
£166 GBP 10 päivässä
0,0 (0 arvostelua)
0,0
0,0
Käyttäjän avatar
Предложение еще не подано
£250 GBP 14 päivässä
0,0 (0 arvostelua)
0,0
0,0
Käyttäjän avatar
I have MS in Information Security with research interest of Cryptography. I have implemented Cryptography algorithms in Java and C, written security solutions in J2EE and Java, have implemented datastructures in Java, and built two websites for research / proof-of-concept purposes. Additionally, ~2 years of IT experience. I have taken Graduate level courses in Cryptography and Security that dealt with analysis of Cryptographic protocols, my Masters level project involved design of a Cryptographic protocol for a specific authentication problem in three-party settings. I have executed a number of projects that focussed almost entirely / heavily on Cryptography. I have also written Cryptographically signed Java applet for a J2EE application. Details about projects executed available on request. You might want to go through reviews project creators left for me on freelancer.com, see https://www.freelancer.com/u/ciphe.html.
£444 GBP 3 päivässä
0,0 (0 arvostelua)
0,0
0,0

Tietoja asiakkaasta

Maan UNITED KINGDOM lippu
kidderminster, United Kingdom
0,0
0
Liittynyt helmik. 13, 2015

Asiakkaan vahvistus

Kiitos! Olemme lähettäneet sinulle sähköpostitse linkin, jolla voit lunastaa ilmaisen krediittisi.
Jotain meni pieleen lähetettäessä sähköpostiasi. Yritä uudelleen.
Rekisteröitynyttä käyttäjää Ilmoitettua työtä yhteensä
Freelancer ® is a registered Trademark of Freelancer Technology Pty Limited (ACN 142 189 759)
Copyright © 2024 Freelancer Technology Pty Limited (ACN 142 189 759)
Ladataan esikatselua
Lupa myönnetty Geolocation.
Kirjautumisistuntosi on vanhentunut ja sinut on kirjattu ulos. Kirjaudu uudelleen sisään.