C programmer for hire rsapekerjaan

Tapis

Carian terbaru saya
Tapis melalui:
Bajet
hingga
hingga
hingga
Jenis
Kemahiran
Bahasa
    Status Pekerjaan
    1,389 c programmer for hire rsa tugasan ditemui, harga dalam USD

    I am looking for 2 full time .NET programmers who will take the time to understand the AOL Protocol, it is a complex task involving mail packets and the unpublished aol protocol, I prefer Visual Basic .NET as I have experience in this category, The first expectation of the project is to port a "Secure Login" C++ file with RSA certs to VB

    $20 - $100
    $20 - $100
    0 bida

    ...listing fee for rfp request *location specific rfp's and bids *collaboration features to include calendar, meeting request, email, chat, etc. for accepted bids *premium/featured listings within categories *enhanced sorting capabilities to sort by project name, price, date, bid requester, etc. *enhanced template library *WAP and syndication ready (RSA) Only

    N/A
    Ditampilkan
    N/A
    0 bida

    Implementation of the RSA algorithm. Generate private/public keys, encrypt/decrypt messages. Can be either a console app that can be compiled on windows or linux or a windows DLL. It should generate prime numbers, than build the keys. It should work with HUGE numbers in order for the RSA to work. Like numbers twice of the size of longint , long

    $7 (Avg Bid)
    $7 Avg Bida
    5 bida
    PKI in VB Tamat left

    trying to find a pure visual basic implementation of public key/private key pair generation and encryption. no ocx/activex, does not use CAPICOM/CryptoAPI. we plan to use RSA as the encryption type and use 128bit keys. we would like to use it to generate 128bit key pairs and encrypt/decrypt strings. e.g. usage: vb program uses this to encrypt

    $8 (Avg Bid)
    $8 Avg Bida
    4 bida

    ...authentication directly to the RSA Ace/Server from with forms authentication. Ie. When logging on we current use the username and password. We need to be able to have an extra field after logged on for the RSA SecureID and handle the pin changes etc as SecureID specificaiton. This needs to directly contact the RSA Ace/Server without installing

    $1009 (Avg Bid)
    $1009 Avg Bida
    4 bida

    ...of a certain type, or those from other countries. Must allow multiple values. Typical values would be AUS,RSA,place. In this example races/markets with the words AUS, RSA and place would be ignored. - Time range to gather races from and to. For example: all races between 00:00 and 06:00. Preferable if this time can take into consideration the time zone

    $140 (Avg Bid)
    $140 Avg Bida
    3 bida

    this is project on "implementation Of RSA Algorithm". my request is "**How to store some very large values like 5000 to the power of 5000 in a variable in** VB6.0 **Language"** for example: i ought to store the value of an expression **" 4590 ^5101 Mod 3245 "** in a variable called "result" ## Deliverables 1) Complete and fully-func...

    $8 (Avg Bid)
    $8 Avg Bida
    1 bida

    I am having trouble with the encryption and decryption function in this project. This is regarding the RSA algorithm using JAVA ONLY. I have been able thus far to complete everything, but I am struggling on creating a modular power algorithm. Our teacher here at my high school gave us strict guidelines. this is what I am having trouble interpreting

    $2 (Avg Bid)
    $2 Avg Bida
    3 bida

    This project involves 6 question. The first question involves cipher block chaining with RSA public key encryption. The second question involves working out the maximum frequency of a workstation in a given network after being pinged. The third question involves using MIB's The fourth question involves working out general network availability

    PHP
    $42 (Avg Bid)
    $42 Avg Bida
    1 bida

    ...WTLS 1.2 for secure mobile-device to gateway communications TLS, SSL for secure gateway-application server communications Certificate Requester for Gateway Certificate Chaining RSA as well as ECC algorithms supported Supports all requirements for MMS Client transaction specification Support for multiple languages Subscriber ID to Portals for pers...

    $6930 (Avg Bid)
    $6930 Avg Bida
    12 bida
    OmniTools Tamat left

    ...ssh to tunnel all traffic through using rsa keys. ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. 2) Deliverables must be in ready-to-run condition, as follows? (depending on the nature? of the deliverables): a)? For web sites or? other server-side deliverables

    $100 - $500
    $100 - $500
    0 bida

    ...browser to a server trough a http (unencrypted) protocol connection using a pre-send encryption Java applet. The encryption uses a two keys (public + private) algorythm (eg RSA). The page intended to collect data will show a Java applet containing a form; the site visitor (the sender) will fill in the form fields and submit the form. The applet will

    $472 (Avg Bid)
    $472 Avg Bida
    9 bida

    create a program using visual C++. the program is about encryption and decryption using the RSA [log masuk untuk melihat URL] table is o= space 1=a to 26=z , ?=27 &=28 !=29 $=30 #=31 *=32 ------------------------------------------ second program is for TI 83 plus calculator to do we need to use the calculator syntax Modular inverse to

    $131 (Avg Bid)
    $131 Avg Bida
    3 bida

    ...MS Visual C 6 or 7, that uses the openssl library and has 3 functions, apart from main(): 1. KeyGen(), which generates a pair of n-bit long RSA keys and saves the keys to disk for later use. Lets name the files [log masuk untuk melihat URL] and pub.key. No encryption of the private key or fancy encoding required. Just save it for later use. No need to ask for ...

    $8 (Avg Bid)
    $8 Avg Bida
    5 bida

    ...into my email box which is RSA encrypted must be made using VB ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. 2) Deliverables must be in ready-to-run condition, as follows (depending on the nature of the deliverables): a) For web sites or other server-side

    $425 (Avg Bid)
    $425 Avg Bida
    19 bida

    ...should be able to decrypt an encrypted message based on the RSA encryption, decryption system. I will give you the public key (the prime numbers are going to be fairly small) and the encrypted message. You will have to write code that should be able to decrypt the message based on the RSA system. We will most likely use an ASCII table to convert text

    $23 (Avg Bid)
    $23 Avg Bida
    11 bida

    ...encrypted data consists of ascii text. Not much is known about the algorithms other then that they seem quite RSA typical. The reason for us needing someone to do this is that we are provided the streaming data cheap this way as it is designed for a client provided by the company we subscribe the stream from, and not customized solution. The company we

    $621 (Avg Bid)
    $621 Avg Bida
    8 bida

    We need a C# class that can generate and verify RSA "signed" serial numbers for software protection. By utilizing a public/private key to create signed (not simply encrypted) serial numbers, we ensure that only the party with the private key can create serial numbers...and our application will be able to verify the authenticity of a given serial number

    $100 - $500
    $100 - $500
    0 bida

    ...a small Computerised Time and Attendance and Access Security Close Corporation in RSA. Our existing Shield NGO series software programs which is written in Delphi 5 / 6 requires certain changes and modifications to be done to the programs. We have a programmer **who requires urgent assistance** to complete the changes and modifications rather

    $76 (Avg Bid)
    $76 Avg Bida
    5 bida

    We need a program that will allow users to setup and send bank payments. We have an existing system for transmission of the payment data, so it just needs to be created in a table to be extracted by another piece of software. Functionality needed. 1. User Login Page 2. User Profile / Name address contact details etc. 3. Setup payment details

    PHP
    $1005 (Avg Bid)
    $1005 Avg Bida
    9 bida

    **1:** In the world of network programming, port and socket are two important concepts. For this part, you need to: 1. Explain what sockets and ports are, and how they are related. 2. Design and write a Java program with GUI to demonstrate the essence of these two concepts, their roles in network programming and their relationships. **2:** To integrate

    $47 (Avg Bid)
    $47 Avg Bida
    4 bida
    AOL Bulk IMER Tamat left

    ...IMER Hello, I have seen and read about some of your work. I think you are the right man for the job. I am flexible and easy to work with. Please take time to look at this project. let me know how long it might take as well. Here is what im looking for: must have a number of aims to use option must connect aims using proxies must have aim

    $495 - $500
    $495 - $500
    0 bida

    ...and will send message of the users choice. Program must have a userfriendly iface. If intrested more information and details of this function will be given. Must know RSA Encryption to complete this project. ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done

    $850 (Avg Bid)
    $850 Avg Bida
    1 bida

    ...enhance. What I need to-do is add RSA PKI 2048 bit encryption to the existing project, as well as secure file deletion. I would also like to add a progress event to indicate progress on large encryption / decryption operations, both symmetrical and asymmetrical. The project must be compatible with Microsoft Visual C++ 6.0, ready to compile, remain

    $100 - $125
    $100 - $125
    0 bida

    Need a program that traces the RSA algorithm for encryption. It should include the following steps: [log masuk untuk melihat URL] user to select two primes : p & q [log masuk untuk melihat URL] p x q to obtain n [log masuk untuk melihat URL] user to choose value for e. [log masuk untuk melihat URL] e and n public [log masuk untuk melihat URL] phi(N)=(p-1)(q-1) and find d s...

    $25 (Avg Bid)
    $25 Avg Bida
    1 bida
    RSA Encryption Tamat left

    Need a program that traces the RSA algorithm for encryption. It should include the following steps: [log masuk untuk melihat URL] user to select two primes : p & q [log masuk untuk melihat URL] p x q to obtain n [log masuk untuk melihat URL] user to choose value for e. [log masuk untuk melihat URL] e and n public [log masuk untuk melihat URL] phi(N)=(p-1)(q-1) and find d s...

    $18 (Avg Bid)
    $18 Avg Bida
    6 bida

    ...enhance. What I need to-do is add RSA PKI 2048 bit encryption to the existing project, as well as secure file deletion. I would also like to add a progress event to indicate progress on large encryption / decryption operations, both symmetrical and asymmetrical. The project must be compatible with Microsoft Visual C++ 6.0, ready to compile, remain free

    $113 (Avg Bid)
    $113 Avg Bida
    3 bida

    I need an implementation of DES, 3DES, and RSA algorithms. ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. 2) Installation package that will install the software (in ready-to-run condition) on the platform(s) specified in this bid request. 3) Complete ownership

    $148 (Avg Bid)
    $148 Avg Bida
    9 bida

    ...enhance. What I need to-do is add RSA PKI 2048 bit encryption to the existing project, as well as secure file deletion. I would also like to add a progress event to indicate progress on large encryption / decryption operations, both symmetrical and asymmetrical. The project must be compatible with Microsoft Visual C++ 6.0, ready to compile, remain free

    $37 (Avg Bid)
    $37 Avg Bida
    1 bida

    a Dos application (a sockets interface) written in C/C++, using Winsock(windows sockets), to create a client on one machine and a server on another. Both generate Public/Private key pair (using RSA) and send each other their public key. (Note: the MIRACL crypto library available at [log masuk untuk melihat URL]~mscott/ must be used, programs genkey.c, [log masuk untuk melihat ...

    $103 (Avg Bid)
    $103 Avg Bida
    9 bida

    Generate a Digital Signature for binary streams of data varying from 800 bytes to 3.5K in size. I am told that a digital signature of about 50 bytes in length can be generated with a key size of 1024 bytes. I would prefer a signature that follows the US federal DSA standard, but am open to suggestions. Diffie-Helman, RSA or others will be considered

    $18 (Avg Bid)
    $18 Avg Bida
    5 bida

    ...6) Then I am looking for the following documentation on which the grading depends on. Please read the following requirements and grading topics from the professor ## Deliverables Requirements Implement RSA using C/C++. You will need to find two large (at least 100-digit) prime numbers p and q to generate the modulus for RSA. Also, show that a 50-digi...

    $132 (Avg Bid)
    $132 Avg Bida
    7 bida

    Need to obtain an autoverificable receipt (digital seal) from an ASCII file and a private key using and MD5, RSA and a Base 64 Table character convertor. It has to been done in Clipper 5.2 or a dll (I prefer Clipper, so I can modify it, just in case) that I can a use in my application. The program has to be fully documentated. ## Deliverables It

    $63 (Avg Bid)
    $63 Avg Bida
    2 bida

    ...es of RSA Purpose To demonstrate understanding of RSA and its resistance to cryptanalytic attacks. Introduction When one transmits data over a packet-switched network, like the Internet, a packet sniffer at any node along the transmission path can detect packets with potentially useful information. Unfortunately, some of this information (for example

    $251 (Avg Bid)
    $251 Avg Bida
    8 bida
    WinRsync Tamat left

    ...available to download as compiled executables which run under the cygwin envioroment. Becuase it must be run over ssh - the ability to enter username and password and to generate RSA keys must be available in the front end - again ssh_keygen is available to generate the keys - then the program must be able to upload the pulic key to the rsync server (probably

    $331 (Avg Bid)
    $331 Avg Bida
    5 bida
    encryption Tamat left

    ...key or password in a dll with the option to modify this key or password from an html page. Also I saw that the component vendors propose several encryption method (MD5, RC4, RSA,...), any idea if one is really superior to the others? Just to sumarize: The encryption and decryption part is easy since with the right component it should be just one line

    $11 (Avg Bid)
    $11 Avg Bida
    7 bida

    This project is to develop small implementations of two public-key cryptosystems: Rivest-Shamir-Adelman (RSA) and ElGamal; in Visual Basic. This should allow me to compare the relative performance of the two developed implementations. ## Deliverables Complete and fully-functional working program(s) in executable form as well as complete source code

    $46 (Avg Bid)
    $46 Avg Bida
    2 bida

    ...the montgomery algorithm and RSA ? Also I have attached some information regarding the Montgomery Algorithm, RSA and the multipliers that has to be implemented. I have already created the multipliers using structural vhdl, 1. Serial interleaved Montgomery multiplier and 2. parallel Montgomery multiplier. The outline for these multipliers are shown in

    $30 - $5000
    $30 - $5000
    0 bida

    I need to design a montgomery multiplier for RSA applications. I need two montgomery multiplier: 1. Parallel Montgomery Multiplier variable size and 2. a serial - Parallel Montgomery Multiplier variable size I have to design these in VHDL and compare Performance v's resources i.e amount of CLB's V's speed between the two Montgomery Multipliers I then

    $63 (Avg Bid)
    $63 Avg Bida
    1 bida