Java simple substitution cipher program jobs

Filtro

Mis búsquedas recientes
Filtrar por:
Presupuesto
a
a
a
Tipo
Habilidades
Idiomas
    Estado del trabajo
    1,230 java simple substitution cipher program trabajados encontrados, precios en USD

    ...that network we will require to access to multiple PC's from 1 to 1000 o more and do the next task in windows 7 x86 1.- And script o code that remotely access the Pc and cipher the disk whit bitlocker or [login to view URL] , but with our require the password from the user at the boot sequence 2.- and script or task that whit Applocker from windows

    $449 (Avg Bid)
    $449 Oferta Promedio
    3 ofertas

    ...hermana de la aplicación android [login to view URL] ya existente. La aplicación funciona con una base de datos SQLite con SQL cipher y utiliza contenido inApp. El desarrollador de así desearlo dispondrá del código fuente en Android y de la aplicación de escritorio utilizada para crear la base de datos. Se

    $308 (Avg Bid)
    $308 Oferta Promedio
    7 ofertas

    we need a metamask Ether wallet+browser app similar to Cipher. The wallet should Only feature Ether & A token adress. The browser should only work with embedded html pages working with css, js & web3j. No adress field should be featured. The app should have buttons which changes the html pages (works as hyperlinks). Can you create this? If yes

    $230 (Avg Bid)
    $230 Oferta Promedio
    7 ofertas

    need someone who is good in cryptography and cryptanalysis as well as in matlab and maple. have to implement "differential-linear attack" on dummy structure of 4 or 8 bit cipher in matlab or maple. at the end i need a brief report and source code with comments. you have to do everything by yourself.

    $482 (Avg Bid)
    $482 Oferta Promedio
    11 ofertas

    I'm looking for someone to create an encryption server like blackberry and cipher. I'm willing to pay big dollars for anyone that can do it. If your outside of auatralia no problem I can travel. Please message me for more details

    $27860 (Avg Bid)
    $27860 Oferta Promedio
    41 ofertas

    Build me a professional book cover with simple professional design (nothing fancy but like professional medical book) Book Title - Internal Medicine High yield Notes Sub title - based on the famous "1500 PUNCH WORDS" website name: [login to view URL] If you are looking for an example how it should like, you can take inspiration from this

    $20 (Avg Bid)
    $20 Oferta Promedio
    23 ofertas

    I need a simple and correct java or C++ project on Ceaser cipher.

    $21 (Avg Bid)
    $21 Oferta Promedio
    17 ofertas

    I need somebody to build a C++ program which takes a file containing cipher keys and then decipher another file and print it. The full details are attached.

    $27 (Avg Bid)
    $27 Oferta Promedio
    17 ofertas

    ...one! I'll give a brief description of the task: You go to part of the server using a post request you need to post some data which is signed, by the looks of it i'd assume cipher signing(?) Here is an example sign: "sign": "nfKxoHVOyV18wc4pBpsz3n8M+HzNwlE61d769vL88y36TdiSTUcFGp44ak8GoPjIq7RlzlE0bxfo2erC98LIMlpGKd/jraWD5tIHQ7FYVk6PK+k9xix+Xm3xcvecs

    $46 (Avg Bid)
    $46 Oferta Promedio
    7 ofertas

    The requirement is to decipher a cryptogram message to plaintext. All details will be sent to interested parties if you want to know more. This project is recommended for cyber security or information security experts. No programming involve. Just explain how you did it.

    $21 (Avg Bid)
    $21 Oferta Promedio
    9 ofertas

    you are commissioned to help our spies crack messages encrypted with the RC4 cipher. through careful research, our fellow spies have found that the vain elite key master of the enemy starts all of the encryption keys with 0x1337d00d1550c001. we also know that all keys are 11 bytes long. you are to implement the ARC4Cracker class found in ARC4Cracker

    $3 / hr (Avg Bid)
    $3 / hr Oferta Promedio
    4 ofertas

    ...gather information for the SSL certificate as follows: 1) SSL / TLS Versions Supported by the server 2) SSL Certificate Information 3) Check if SSL RC4 Cipher Suites Supported 4) Check if SSL Cipher Suites Supported 5) Check if HSTS is Missing From HTTPS Server 6) SSL Version 2 and 3 Protocol Detection The above information should be saved on a

    $374 (Avg Bid)
    $374 Oferta Promedio
    14 ofertas

    I want someone to do a detailed internet research on football matches played on April 2018 and get me the Formations, Lineups, Substitutions and Substitution time, Corners and Corners time. You can get me an excel data sheet with the above information. Please do not introduce yourself and start your answer with "I can". You may write if you could do

    $89 (Avg Bid)
    $89 Oferta Promedio
    21 ofertas

    Hi there! I'm based in Ahmedabad, India. This project is related to lightweight cipher, cryptography. I have attached a pdf containing information relevant to this project which can be found in section 3.1 of uploaded pdf (round-based based architecture of PRESENT-80). The code has already been developed and I'm getting the proper results as well. But

    $55 (Avg Bid)
    $55 Oferta Promedio
    4 ofertas

    Hi there! I'm based in Hyderabad, India. This project is related to cryptography. I have attached a pdf containing information relevant to this project which can be found in the pages between 342 to 355. The code has already been developed and I'm getting the proper results as well. But I want to build a clock based design so that I can perform power analysis on it. Need the code proper...

    $30 (Avg Bid)
    $30 Oferta Promedio
    2 ofertas

    ...the following: Lattice-Based Cryptography (You need to go through Vector Space first) Quantum Cryptography Post-quantum Cryptography Blowfish Twofish MARS DEAL, a Feistel cipher using DES as the round function The Tiny Encryption Algorithm, or TEA LOKI97, one of the LOKI family of ciphers, from Australia The report should have around 20 pages with

    $56 (Avg Bid)
    $56 Oferta Promedio
    14 ofertas

    We are looking for someone who will delete the part of the photo which we have scribbled out. We have sent the original ph...out. We have sent the original photo and also shown on the second picture which part we want you to get rid of. It is a quick, simple and easy job. The font is [login to view URL]

    $9 (Avg Bid)
    Garantizado
    $9
    4 participaciones

    I am looking to find someone who can design me a graphic for a t-shirt. we have the file below which we would like to use but...a graphic for a t-shirt. we have the file below which we would like to use but we would like the text in the photo changing to Cipher The font we would like you to use is [login to view URL]

    $12 (Avg Bid)
    Garantizado
    $12
    3 participaciones

    ...your work step by step until you generate the Plaintext Your plaintext is: “Here you can encrypt a block of bytes with a key using the popular Advanced Encryption Standard cipher” . All the internal steps of the computation are shown, which can be helpful for anyone debugging their own AES implementation. In each of the 10/12/14 rounds, the sub-steps

    $40 (Avg Bid)
    $40 Oferta Promedio
    12 ofertas

    Turn on TLS 1.0, TLS 1.1, and TLS 1.2 in Advanced settings...and TLS 1.2 in Advanced settings and try connecting to [login to view URL] again. If this error persists, it is possible that this site uses an unsupported protocol or cipher suite such as RC4 (link for the details), which is not considered secure. Please contact your site administrator.

    $18 (Avg Bid)
    $18 Oferta Promedio
    6 ofertas

    I have a plain Text with me, and I need that to be converted to a ciphertext and that cipher text has to be converted back to plain text. All this should be done by using AES encryption. All the process should be explained clearly on a document for every round. I need this ASAP.

    $28 (Avg Bid)
    $28 Oferta Promedio
    13 ofertas

    ...your work step by step until you generate the Plaintext Your plaintext is: “Here you can encrypt a block of bytes with a key using the popular Advanced Encryption Standard cipher” . All the internal steps of the computation are shown, which can be helpful for anyone debugging their own AES implementation. In each of the 10/12/14 rounds, the sub-steps

    $33 (Avg Bid)
    $33 Oferta Promedio
    15 ofertas

    DES Algorithm in java is called as following: Key key = generateKey("12345678"); Cipher c = [login to view URL]("DES"); [login to view URL](Cipher.ENCRYPT_MODE, key); byte[] encVal = [login to view URL]([login to view URL]()); I want a DES algorithm implemented code, and its execution time is required to be as same as in JDK. those links may help to understand ...

    $137 (Avg Bid)
    $137 Oferta Promedio
    12 ofertas

    Hi there! I'm based in Hyderabad, India. This project is related to cryptography. I have attached a pdf containing information relevant to this project which can be found in the pages between 342 to 355. The code has already been developed but I'm unable to procure the final result. ( As i can see that the individual modules are successfully executing but the final result doesn't a...

    $158 (Avg Bid)
    $158 Oferta Promedio
    9 ofertas

    I have a cryptography problem solving. Due 9:am 06 Aug 2018 Consist...sequence:0,1, 1, 0, 1... Find the next 3elementsofthesequence, and determine the period of the recursion relation. Xn+2=Xn+1+Xn+1, 0,1,1,0,1,0,0,1 Problem Topic : Affine Cipher Hill Cipher LFSR Extended EuclideanAlgorithm Chinese RemainderTheoremand Euler'sTheorem ModulusArithmetic

    $41 (Avg Bid)
    $41 Oferta Promedio
    9 ofertas

    import [login to view URL]; import [login to view URL]; public class a { private static final String c = [login to view URL](); Cipher a; Cipher b; public a(String str) { byte[] bArr = new byte[]{(byte) -88, (byte) -101, (byte) -56, (byte) 50, (byte) 86, (byte) 52, (byte) -29, (byte) 3}; try

    $259 (Avg Bid)
    $259 Oferta Promedio
    8 ofertas
    Trophy icon Need a Logo Ended

    I need a logo designing for my brand, I have a picture of a design which i would like my writing in. The design says Revenge and i wo...Logo in the revenge style Writing in a black version and a version in white. The font is XXII Ultimate Black Metal [login to view URL] ----- This is the link to the FONT

    $13 (Avg Bid)
    Garantizado
    $13
    31 participaciones

    ...time consuming and difficult process than it needs to be • Giving up favorite meals in any diet can be hard. While there are numerous recipe books available, a source for substitution recipes and new culinary creations can be tough to find. We aim to build a web store that solves these challenges and provides a single source for great Paleo recipes, information

    $853 (Avg Bid)
    $853 Oferta Promedio
    103 ofertas

    I have a 2 line, 40 character cipher. There are 20 unique characters, including capital and lowercase letters, numbers, and symbols. I need to solve this message for a project with friends. I will send the cipher when we agree to the contract, but can provide more information if needed.

    $140 (Avg Bid)
    $140 Oferta Promedio
    3 ofertas

    ...will be a 10 PCB array. Each PCB will have a .6: touchpad that breaks off by scorred PCB. Header H1 will plug into Header H4 and Header H2 will plug in to Header H3. No substitution of parts shown on BOM unless approved by my Engineer. I must be able to communicate in English and prefferably by telephone as part placement and scorong must be exactly

    $461 (Avg Bid)
    $461 Oferta Promedio
    27 ofertas

    ...and Nginx. The problems reported by Qualys are: "- This server supports weak Diffie-Hellman (DH) key exchange parameters. Grade capped to B. - This server accepts RC4 cipher, but only with older protocols. Grade capped to B. - This server's certificate chain is incomplete. Grade capped to B." Please reply with details of experience, professional

    $311 (Avg Bid)
    $311 Oferta Promedio
    36 ofertas

    ...PLAYFAIR CIPHER) 1. Name of program: [login to view URL] 2. Use command syntax: playfair -e key <[login to view URL]> <[login to view URL]> playfair -d key <[login to view URL]> <[login to view URL]> where -e option is encryption and -d option is decryption 3. Program must cope with special inputs (e.g. replacing 'i' with 'j')...

    $116 (Avg Bid)
    $116 Oferta Promedio
    15 ofertas

    I have 6 images of the render of one pallet of exhibition, but the product of the pallet has changed, so i need a substitution (replace of) the old product with the new image , for example:

    $23 (Avg Bid)
    $23 Oferta Promedio
    25 ofertas

    You are to design, write, test, and debug a MARIE assembly language program that inputs a sequence of characters from the set A-Z (capital letters only), stores each character in memory after it is transformed by the trivial ROT13 cipher, and then, after character input completes, outputs the transformed characters. A template source code file (Project-2_Start

    $57 (Avg Bid)
    $57 Oferta Promedio
    6 ofertas

    ...code means 'crack the code' achieved through a bespoke (unique) 'code' - lets refer to this as *cipher*. I have developed a *cipher* which converts English words into letters, colours and symbols. There are up to 50 letter/colours/symbols in my unique *cipher* that I need to apply to English words. Here are the project outcomes or User Story that you

    $2042 (Avg Bid)
    $2042 Oferta Promedio
    10 ofertas

    I have 4 parts to this homework that I need help in, relating to crypto algorithms (playfair cipher, affine cipher, CFB TEA, linear "DES") that is to be programmed in Java.

    $95 (Avg Bid)
    $95 Oferta Promedio
    11 ofertas

    Looking for someone who knows cipher signing very well. I will attach four (4) photos to this project. Information: The first photo you see is a "GET" request, this clearly just gets the data for that part of the program. The second photo is a "POST" request, this posts the data (this is where it's supposed to SIGN the post to the server) The third

    $31 (Avg Bid)
    $31 Oferta Promedio
    3 ofertas

    Looking for someone who knows about cipher signing, when visiting an address via a private API it requires a "sign". cipher suite: "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256" This is in python 2/3, I can make changes for either. In your proposal let me know additional information you will need.

    $22 (Avg Bid)
    $22 Oferta Promedio
    7 ofertas

    ...Mathematics. This gamification for student to learn topic Linear Algebra by solving real life problem using storytelling strategy. 5 methods : Method 1: graphing Method 2 : substitution Method 3 : elimination (addition) Method 4 : gauss elimination Method 5 : gauss Jordan elimination game elements : Points, Badges, Leaderboards, Progression, Status, Levels

    $786 (Avg Bid)
    $786 Oferta Promedio
    13 ofertas

    i would like to program and enhanced CP-ABE program using java programming language, it involves adding a part to the original source code that would make it support user revocation process. more details will be discussed after agreeing terms

    $157 (Avg Bid)
    $157 Oferta Promedio
    7 ofertas

    ...file for plaintext or ciphertext (assume only 26 letters, no special characters, numbers and punctuations) – 3 substitution ciphers, M1,M2,M3 • M1 – left shift 3 letters • M2 – Plain: a b c d e f g h i j k l m n o p q r s t u v w x y z Cipher: D K V Q F I B J W P E S C X H T M Y A U O L R G Z N • M3 – right shift 5 letters – cycling pat...

    $39 (Avg Bid)
    $39 Oferta Promedio
    15 ofertas

    Need to implement CLOAK protocol(attached) but using MICKEY 2.0 cipher instead of AES. Orientation with python is a must

    $42 (Avg Bid)
    $42 Oferta Promedio
    5 ofertas

    ...WPA2 Key: (text field and must be 8 or more character) <<< This field needs to create wireless>security>profile> with the following selected WPA2psk Unicast - [login to view URL], group cipher - [login to view URL] Wireless Frequency (drop down list & only display “1 - 2412” , “6 - 2437” , “11 - 2457” Secondary SSID (creates v...

    $300 (Avg Bid)
    $300 Oferta Promedio
    1 ofertas

    I need to implement AWS security communication between mobile devices using Mickey cipher 2.0 Will attach detailed project description files and source codes to bidders. Deadline is 3 days. I am sure only cryptography & python experts can do that..... Happying bid. deadline 3 days

    $61 (Avg Bid)
    $61 Oferta Promedio
    1 ofertas

    I need to implement AWS security communication between mobile devices using Mickey cipher 2.0 Will attach detailed project description files and source codes to bidders. Deadline is 3 days. I am sure only cryptography & python experts can do that.

    $40 - $70 / hr
    $40 - $70 / hr
    0 ofertas

    I need to implement AWS security communication between mobile devices using Mickey cipher 2.0 Will attach detailed project description files and source codes to bidders. Deadline is 3 days. I am sure only cryptography & python experts can do that.

    $84 (Avg Bid)
    $84 Oferta Promedio
    2 ofertas

    I need to implement AWS security communication between mobile devices using Mickey cipher 2.0 Will attach detailed project description files and source codes to bidders. Deadline is 3 days. I am sure only cryptography & python experts can do that.

    $10 - $30
    $10 - $30
    0 ofertas

    I need to implement AWS security communication between mobile devices using Mickey cipher 2.0 Will attach detailed project description files and source codes to bidders. Deadline is 3 days. I am sure only cryptography & python experts can do that.

    $59 (Avg Bid)
    $59 Oferta Promedio
    2 ofertas

    I'm looking for someone who knows about cipher algorithms. In my console app let's say I do a post request, the post will get rejected because it needs to be signed with a cipher algorithm which I am unsure on how to do myself. If you can implement this into my console app let me know, my budget is not "set in stone" depending on the person, I will

    $60 (Avg Bid)
    $60 Oferta Promedio
    16 ofertas

    I need to implement AWS security communication between mobile devices using Mickey cipher 2.0 Will attach detailed project description files and source codes to bidders. Deadline is 3 days. I am sure only cryptography & python experts can do that.

    $403 (Avg Bid)
    $403 Oferta Promedio
    3 ofertas