Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    3,030 cryptography jobs found

    This project requires real GPU computation, correct Bitcoin cryptography handling, and verifiable results. This is not a demo or theoretical project. The program must be fully functional and tested. Only apply if you have proven experience with CUDA, cryptography, or Bitcoin key handling.

    $158 Average bid
    $158 Avg Bid
    1 bids

    ...Needed – GPU-Accelerated Bitcoin WIF Key Recovery Tool (Verification Required) Project Description: I am looking for an experienced CUDA / GPU developer to build and optimize a high-performance Bitcoin WIF private key recovery program. This project requires real GPU computation, correct Bitcoin cryptography handling, and verifiable results. This is not a demo or theoretical project. The program must be fully functional and tested. Only apply if you have proven experience with CUDA, cryptography, or Bitcoin key handling. Technical Requirements: - Written in C++ with CUDA - Runs on NVIDIA GPUs - Command-line interface (CLI) - Supports Bitcoin WIF (Base58Check) - Supports compressed and uncompressed private keys - Correct checksum validation - Generates private ...

    $235 Average bid
    $235 Avg Bid
    34 bids

    I need a security-minded experienced and professional developer who can build a robust licensing subsystem for my commercial Windows application. The codebase mixes Python and C++, so I want the licensing layer written in both languages where each makes the mo...criteria • A licence signed on machine A refuses to activate on machine B. • Any byte-level change to the DLL or compiled Python shuts the app down gracefully. • Unit tests demonstrate correct RSA signing/verification and HWID matching. • All deliverables build and run on a clean Windows VM using only the provided scripts. If you have deep & professional experience in C++, Python, RSA cryptography, and low-level Windows security, I’m ready to start right away and will happily answer any...

    $2029 - $4057
    Featured Sealed NDA
    $2029 - $4057
    53 bids

    Project Description: I am looking for an expert Android/WearOS developer for a fixed-price, one-time project. I need a custom background service for my Samsung Galaxy Watch Ultra to act as a personal "black box" for auditing my own work environment (health and safety logging). Core Requirements: Persistent Foreground Service: Must stay active for 8+ hours (handling Doze mode a...LTE is available. No UI popups or interaction required. Device Management: Implementation of Device Owner / Kiosk Mode (DPM) to ensure the service remains active during the entire work shift. Deliverables: Full Kotlin source code. Signed APK for ADB installation. Simple guide for installation via ADB. Required Skills: Android Native (Kotlin), WearOS SDK, Background Services (WakeLocks), Cryptog...

    $2242 Average bid
    $2242 Avg Bid
    50 bids

    I need help decoding a couple of encrypted messages using a standard dictionary code from 1927-1935. I have the messages and the solutions in two examples. There is a third and maybe a fourth and fifth. I need to find the dictionary (or dictionaries) an...messages and the solutions in two examples. There is a third and maybe a fourth and fifth. I need to find the dictionary (or dictionaries) and the method of coding. The messages are in scanned image formats. Requirements: - Experience with historical encryption techniques - Proficiency in handling and decoding dictionary codes - Access to standard dictionaries for 1930s Ideal skills: - Cryptography expertise - Attention to detail and accuracy Please provide samples of similar work. Will require an NDA and IP contract for ...

    $582 Average bid
    $582 Avg Bid
    36 bids

    ...when holders burn the Primary Asset, so a secure burn-and-mint mechanism has to be baked directly into the state machine. Technical focus • Cosmos SDK is the chosen framework; please be comfortable extending Tendermint and writing custom Rust / Go modules. • The chain must scale horizontally before anything else, while still keeping latency low enough for responsive dApp UX. • Robust cryptography, clear key-management flows, and a deterministic state machine are non-negotiable. What I expect to receive - Full node implementation with custom consensus logic and asset modules - Oracle-driven minting engine wired to external REST/GraphQL feeds - Burn-and-Mint bridge contracts/modules linking Primary and Reward assets - Deployment scripts, CI tests, and...

    $629 Average bid
    $629 Avg Bid
    13 bids

    I need a JSON Web Key (JWK) for API security, compliant with RSA specifications (RFC 7518). The RSA key must be 2048 bits. Requirements: - Generate a JWK with x5c and x5t - RSA 2048 bits compliance - Adhere to RFC 7518 standards Ideal Skills and Experience: - Expertise in cryptography and JWKs - Familiarity with RFC 7518 - Proven experience with RSA key generation

    $42 Average bid
    $42 Avg Bid
    19 bids

    I'm very interested in your job "Ui AI twin based on Uometry" I’m excited to bring your visionary project, Ui, to life. As a developer experienced in AI, cryptography, and secure digital identity solutions, I believe I can help you create the transformative, sovereign digital twin experience you’ve outlined. The integration of quantum-inspired interactions, sacred geometry, and personalized behavioral data is a groundbreaking concept that I am eager to contribute to. I have a strong background in AI, cryptography, and mobile development, and I am passionate about creating innovative and secure digital experiences. I will ensure your app is not only cutting-edge but also scalable, secure, and aligned with your vision. I look forward to collaboratin...

    $47 / hr Average bid
    $47 / hr Avg Bid
    1 bids

    ...It must be a Windows desktop application developed using Python, with MySQL/MariaDB as the database backend. The project scope is clearly defined and fixed. No additional features beyond what is mentioned below. --- TECHNOLOGY STACK (MANDATORY) Python 3.10 or higher Desktop GUI: PyQt5 / PyQt6 / PySide6 (preferred) Database: MySQL / MariaDB PDF generation: ReportLab Licensing & cryptography: cryptography / PyOpenSSL Packaging: PyInstaller (final EXE) Application must work fully offline after installation --- CORE FUNCTIONAL REQUIREMENTS 1. Licensing System (Mandatory) Application must run only if a valid license file is present License must be: Time-bound (valid from / valid to) Machine-bound (hardware or system hash) License verification must occu...

    $356 Average bid
    $356 Avg Bid
    12 bids

    Hi , Looking for .NET Code Security Expert is a professional specializing in building and auditing secure applications using Microsoft's .NET framework. Need to focus on secure coding practices, threat mitigation, secure design, validation controls, authentication/authorization, cryptography, and handling vulnerabilities like SQL Injection and XSS to protect against cyber threats, often certified through programs like CASE.NET. They integrate security throughout the Software Development Life Cycle (SDLC) Looking forward to your response. Regards, Dipak

    $8 / hr Average bid
    $8 / hr Avg Bid
    31 bids

    ...investigations, and provided insights to support decision-making. I am passionate about solving real-world problems using AI and security-driven approaches. I enjoy working at the intersection of machine learning, cybersecurity, and data science, with a particular interest in secure machine learning systems, threat detection, and intelligent data modeling. Key Skills: Machine Learning, Cybersecurity, Cryptography, Data Analysis, Statistical Modeling, Python, Java, C, SQL, MLops (Airflow, Mlflow, Docker, FastAPI), Forensics Tools, Network Security (Wireshark), SPSS, SAS, R....

    $10389 Average bid
    $10389 Avg Bid
    33 bids

    ...ERC-standards, and, where it makes sense, an L2 or private side-chain—yet the architecture must still communicate with other chains for true interoperability. Here’s the flow I have in mind: • On-chain smart contracts store only encrypted hashes/pointers; actual PHI lives off-chain (IPFS, Filecoin, or an encrypted database—open to your recommendation). • Role-based permissions and public-key cryptography determine who can write or read a record, aligning with HIPAA requirements. • A lightweight middleware layer (REST or GraphQL) bridges existing EHR systems and handles FHIR mapping so providers can plug in with minimal refactoring. • Cross-chain messaging or bridging (e.g., Chainlink CCIP, LayerZero, or a custom relay) proves that a re...

    $142 Average bid
    $142 Avg Bid
    8 bids

    ...tamper with data in transit or at rest. Scope • Only the web apps in my staging and production environments are in scope; no network or mobile testing is required. • Attention should centre on TLS configuration, session handling, key management, and any custom encryption routines embedded in the codebase. Typical tooling might include Burp Suite, OWASP ZAP, SSL Labs, and your preferred cryptography analyzers, but feel free to suggest alternatives that achieve deeper coverage. Deliverables 1. A concise executive summary highlighting overall risk. 2. A detailed technical report listing each discovered vulnerability, its CVSS or comparable severity rating, proof-of-concept evidence, and step-by-step remediation advice. 3. A brief call or recorded walkthrough c...

    $673 Average bid
    $673 Avg Bid
    49 bids

    Job Description We are looking for a developer to create and integrate Aadhaar Secure QR Code decoding and verification into both an Android app and a Web app. The solution should scan the Aadhaar Secure QR, decrypt and verify UIDAI-signed data, and extract demographic details ...Secure QR Code * Decode & verify UIDAI digital signature * Extract details: Name, DOB/YOB, Gender, Address, Photo (if available) * Integrate with Android (camera scan) and Web (webcam scan) * Use open-source libraries (e.g., pyaadhaar) or third-party APIs * Follow UIDAI offline verification guidelines ### Skills Required * QR code processing * Android development * Web development * API / cryptography / data verification experience * Aadhaar / KYC experience preferred ### Project Type Fixed p...

    $281 Average bid
    $281 Avg Bid
    20 bids

    ...Transaction Transmission and Propagation o Network Verification Process • Mining and Consensus Basics o Bitcoin Mining Introduction o Spending the Transaction PART II: CRYPTOGRAPHIC FOUNDATIONS Chapter 3: Cryptographic Keys and Addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 • Cryptographic Fundamentals o Public Key Cryptography o Why Use Asymmetric Cryptography? o Elliptic Curve Cryptography Explained o Private Keys and Public Keys • Address Evolution and Types o Output and Input Scripts o IP Addresses: The Original Address for Bitcoin (P2PK) o Legacy Addresses for P2PKH o Base58check Encoding o Compressed Public Keys • Modern Address Standards o Legacy Pay to Script Hash (P2SH) o P2SH Collision Atta...

    $30 / hr Average bid
    $30 / hr Avg Bid
    52 bids

    ...Identity management (e.g. SAML, SSO, OIDC, SCIM, etc) security best practices. • Application and infrastructure security testing methodologies and tools. • Vulnerabilities (old and new), and options for defense / mitigation. • Product vulnerability management lifecycle. • Working with and/or supporting product engineering teams. • Security audits, penetration tests, and/or bug bounty programs. • Cryptography and cryptographic primitives. • Strong written and verbal communication skills. • Full SDLC Support for new product features being developed. This would include Threat Modeling, Design Review, Manual Code Review, Exploit writing, etc. • Work with other security teams to provide support for Incident Response and Vulnerability Respon...

    $197 Average bid
    $197 Avg Bid
    31 bids

    I have to submit a 3,000-word portfolio that demonstrates how cryptography is used in real-world applications, and I need it back within 10 hours. The written part must concentrate on cryptographic applications—think secure messaging, blockchain, electronic voting, or any other use cases that clearly show theory meeting practice. Alongside the narrative, I want concise, well-commented code snippets (Python preferred, but another mainstream language is fine if justified) that readers can run straight away. Here’s what I expect: • 3,000 words ± 5 %, focused on applied use cases. • At least two runnable examples that compile or execute without extra setup—common libraries such as Python’s cryptography or PyCrypto are OK. • Cl...

    $273 Average bid
    $273 Avg Bid
    61 bids

    I’m kicking off the Finternet App—the first of two products in our roadmap—and I need a front-end specialist who can translate heavyweight finance and cryptography into an experience that feels light, clear, and agentic. Tech stack & collaboration You’ll lead the React, and TypeScript front-end, plugging into APIs from our blockchain, cryptography, and settlement teams. Expect daily access to domain experts who can clarify protocol-level details so you can stay focused on UX. Scope of work The initial milestone concentrates on four pillars: • Financial transaction management with real-time status updates • Cryptographic operations management—signing, verification, and key handling surfaced cleanly to users • Unified ...

    $20 / hr Average bid
    $20 / hr Avg Bid
    54 bids

    We are looking for a Machine Learning expert with proven experience in Side-Channel Analysis (SCA) to help build a full ML pipeline capable of extracting sensi...preprocessing pipeline Trained ML models Python scripts for inference, training, and visualization ROI definitions & performance benchmarks Instructions for integrating the inference engine with Husky/PC capture scripts ML expert Ideal Freelancer Strong background in Machine Learning + Signal Processing Prior experience with Side-Channel Analysis (CPA, DPA, Template Attacks) Experience with cryptography (DES/3DES, RSA) is a major advantage Ability to convert raw oscilloscope/Husky traces into ML-ready datasets To Apply Please share: Relevant ML/SCA experience Examples of similar projects Proposed approac...

    $30 / hr Average bid
    $30 / hr Avg Bid
    9 bids

    I am looking for a skilled cybersecurity or cryptography developer who can build an advanced AES encryption/decryption system on Kali Linux. The system should include: AES‑256 encryption and decryption Secure key handling Command‑line interface (CLI) or GUI Optionally: hashing, key‑derivation (PBKDF2/Argon2), or file‑level encryption Clean and documented code (Python or C preferred) Experience with Kali Linux, OpenSSL, Python cryptography libraries, or custom AES implementations is required.

    $18 / hr Average bid
    $18 / hr Avg Bid
    13 bids

    ...Questions (Must be answered in the proposal) 1. Do you have prior experience in designing or analyzing block ciphers, not just implementing existing algorithms such as AES? 2. Have you ever performed differential or linear cryptanalysis on a cipher? 3. Are you theoretically familiar with SPN and Feistel structures? 4. Have you contributed to or co-authored any academic publication in security or cryptography? 5. Can you formally define IND-CPA security and explain how it can be tested experimentally?...

    $675 Average bid
    $675 Avg Bid
    93 bids

    ...FastAPI endpoint. 2. Your service signs that XML with the .p12 certificate I supply, then inserts the required QR code. 3. It forwards the signed file to the target URL I will provide. 4. Whatever the remote server returns comes back as JSON; simply pass that JSON straight through to the original caller. Technical notes • Target stack: Python 3.x, FastAPI, async/await. Feel free to use cryptography, PyOpenSSL, or any reliable library for handling the .p12 signature, and qrcode or similar for QR generation. • Please handle the certificate in memory only and remove any temp artifacts after use. • No GUI is needed—just a clean REST endpoint and clear logging. Deliverables • FastAPI app exposing a POST /process (or comparable) route. •...

    $28 / hr Average bid
    $28 / hr Avg Bid
    106 bids

    ...vulnerabilities in quantum computing systems, quantum networks, and associated infrastructure before they can be exploited by malicious actors. Key Responsibilities • Conduct comprehensive penetration testing on quantum computing nodes and quantum machine infrastructure • Assess security vulnerabilities in quantum key distribution (QKD) systems and quantum network communications • Evaluate post-quantum cryptography implementations and identify weaknesses • Test quantum-resistant algorithms and their implementations for vulnerabilities • Perform security assessments on quantum machine node. • Analyze quantum interfaces, control systems, and measurement planes for security flaws • Document findings with detailed technical reports including risk ra...

    $134 Average bid
    $134 Avg Bid
    5 bids

    ...Implementation of these components in Python as part of a modular encryption framework Requirements: Strong experience in Python Familiarity with cryptography, block cipher structures, or mathematical algorithms Good understanding of neural networks (NN) and ideally XAI techniques Full confidentiality — all code, ideas, and files must remain my property and cannot be reused or shared Workflow: I provide a general overview to confirm your understanding. We agree on milestones and delivery steps. After signing an NDA, you will receive the complete technical design and detailed requirements. Please send me: Examples of related work (cryptography, AI, algorithmic projects, etc.) Your estimated timeline Your proposed cost Thank you, and I look forward to wor...

    $204 Average bid
    $204 Avg Bid
    44 bids

    ...vulnerabilities in quantum computing systems, quantum networks, and associated infrastructure before they can be exploited by malicious actors. Key Responsibilities • Conduct comprehensive penetration testing on quantum computing nodes and quantum machine infrastructure • Assess security vulnerabilities in quantum key distribution (QKD) systems and quantum network communications • Evaluate post-quantum cryptography implementations and identify weaknesses • Test quantum-resistant algorithms and their implementations for vulnerabilities • Perform security assessments on quantum machine node. • Analyze quantum interfaces, control systems, and measurement planes for security flaws • Document findings with detailed technical reports including risk ra...

    $135 Average bid
    $135 Avg Bid
    1 bids

    ...modern blockchain technologies. Candidates from Dhanbad and Jharkhand will be given the highest preference. But the opportunity is open for all candidates from Jharkhand only. Mandatory Technical Skills (Core Blockchain Skills)Blockchain Fundamentals Strong understanding of Blockchain architecture Understanding of decentralized systems (P2P networks, consensus algorithms) Knowledge of hashing, cryptography, wallets, nodes, miners/validators Smart Contract Development: Solidity (Mandatory) Experience with Ethereum, BNB Chain, Polygon, Solana, etc. Understanding of ERC-20, ERC-721, ERC-1155 standards Smart contract testing frameworks (Hardhat, Truffle) Gas optimization techniques Backend & Web3 Development: , Node.js (Express/) for backend services REST & GraphQL AP...

    $380 Average bid
    $380 Avg Bid
    12 bids

    I’m working on a university coursework module centred on Data Encryption, with an explicit emphasis on Asymmetric Encryption. The assignment is theory-heavy but still expects algorithmic clarity, so I need concise, well-structured written answers that: • Explain core asymmetric concepts (key generation, encryption/decryption flow, mathematical underpinnings) in plain language suitable for an academic submission. • Compare at least two algorithms—RSA is mandatory, and you may contrast it with ElGamal, ECC, or another relevant scheme—to highlight strengths, weaknesses, and typical use-cases. • Provide clean, language-agnostic pseudocode for each algorithm section (key generation, encryption, decryption, signature where applicable). Comment each step so t...

    $173 Average bid
    Urgent
    $173 Avg Bid
    8 bids

    I’m looking for someone who can take me from concept to store-ready builds of a fully private messenger that r...two devices on each platform, verified in TestFlight / internal track. – Independent inspection confirms that messages stored on the server are indecipherable. – No crashes during a 48-hour soak test with at least 100 concurrent conversations. – Complete source code, build scripts, and minimal setup guide delivered before sign-off. If you’ve shipped secure chat apps before—or have deep cryptography experience—let’s talk specifics and map out the milestones together. Please also list the requirements for such a business, and your estimates on monthly expenses. Keep it short and be direct in proposals, I don't wa...

    $1747 Average bid
    $1747 Avg Bid
    137 bids

    I need an expert to protect personal data using cryptography. The primary technique to be used is hashing. Key requirements include: - Expertise in cryptographic techniques, especially hashing - Experience with data protection regulations - Ability to implement secure hashing algorithms Ideal Skills: - Strong background in cybersecurity - Familiarity with various hashing algorithms - Knowledge of compliance standards for personal data protection

    $31 Average bid
    $31 Avg Bid
    9 bids

    ...Firebase. The key is the hash itself, or the hash is indexed against a unique registration ID. DB stored: [ID, H, Creator ID, Timestamp]. 4. Return Flask returns a Flask ID Registration ID (or a combination of the hash ->Frontend The unique ID (the "signature" you mentioned). and creator ID) to the user. The key returned to the user is not a traditional digital signature (which involves Public Key Cryptography), but rather a Proof of Prior Registration. The "Signature" is the Verifiable Information needed to check the Ledger: Signature/Proof = Registration ID + Timestamp The real "signature" is the stored hash $H$ itself, because only the original content can re-generate that exact hash. 3. Verification Phase (The Check) If a third-party finds the...

    $81 Average bid
    $81 Avg Bid
    12 bids

    I need a seasoned cryptography specialist to review our existing encryption protocols, key-management setup and digital-signature workflows with one clear objective: prove that everything we run can stand up to recognised standards and regulations. Here’s what the engagement will look like: • You receive full technical documentation and limited test-environment access to the three areas in scope. • You analyse algorithm choices, key sizes, entropy sources, storage and rotation practices, signature generation and verification paths, plus any supporting libraries or HSM integrations. • You map each finding to the most relevant benchmark—Saudi NCS, NIST guidance, FIPS 140-3, ISO 27001 Annex A controls, ETSI, or comparable frameworks—highlighting a...

    $13020 Average bid
    $13020 Avg Bid
    4 bids

    I’m putting together the written component of a university-level course project on cryptography and data protection, and I want the documentation to revolve squarely around modern encryption techniques. The content must walk students step-by-step through symmetric encryption, asymmetric encryption, and the most common cryptographic hash functions, explaining how each works, why it matters, and where it is typically applied. What I need from you is a clear, well-structured document (approximately 25–30 pages, though quality comes first) that blends theory with concise, real-world examples. Include diagrams or simple code snippets where they genuinely help comprehension, but keep the narrative accessible to students encountering these ideas for the first time. Deliverab...

    $172 Average bid
    $172 Avg Bid
    29 bids

    ...recovery, 2FA enrolment and email relay configuration Acceptance The app must compile and run on Windows 10/11, lock on inactivity, and refuse to open the vault without the correct master password plus second factor when enabled. All secrets should remain encrypted when at rest and must not be retrievable in plain text by simple file inspection. If you have relevant experience with desktop cryptography, WinUI/WPF, and 2FA integration, I’d love to see a quick outline of your proposed tech stack and timeline....

    $127 Average bid
    $127 Avg Bid
    12 bids

    ...in the full Signal protocol—X3DH for the first handshake, ECDH+Double Ratchet for forward secrecy, AES-GCM-256 with HKDF-HMAC-SHA-256 for payload protection. On paper everything looks correct, yet in practice messages still slip out in plaintext or throw a “failed to send” error whenever the recipient hasn’t generated keys or an old session is corrupted. What I need now is an experienced cryptography engineer who has actually debugged Signal-based stacks to step in right away, review my current implementation and make the encryption rock-solid. The most pressing pain point is the message-encryption phase itself; sessions sometimes never initialise or silently fall back to no cipher at all. Deliverables I expect: • Diagnose why sessions aren&rs...

    $30 / hr Average bid
    $30 / hr Avg Bid
    39 bids

    Logo Design Contest: ThinkBox - Secure Desktop Environment About ThinkBox: ThinkBox is a cutting-edge secure desktop environment built for Jetson Nano hardware. It combines advanced hardware security (secure element cryptography), HID forwarding, low-latency video streaming, and a modern desktop interface with a sleek, glass-morphism design aesthetic. ThinkBox bridges the gap between secure embedded computing and professional desktop environments. What We're Looking For: We need a professional, modern logo that represents innovation, security, and intelligent computing. The logo should: - Convey security, trust, and technology - Incorporate or be inspired by the "box" concept (but don't feel constrained by it) - Work well in both light and d...

    $14 Average bid
    $14
    217 entries

    I need an experienced developer who has **proven experience** with the Wise (formerly TransferWise) API, specifically with Strong Customer Authentication (SCA) for accessing balance statements. ### Current Situation - We have a Node.js/Express backend appli...Verified key pair matches (modulus comparison) - Deployed to production with all fixes - Still getting `x-2fa-approval-result: REJECTED` from Wise **If you've solved Wise SCA authentication issues before, this is the job for you.** --- ## Skills Required - Wise API - TransferWise API - SCA Authentication - RSA Signatures - Node.js - - Webhook Implementation - API Integration - Cryptography **Payment**: Milestone-based - 50% when you successfully sync transactions from Wise API - 50% when webhooks are working and ver...

    $43 / hr Average bid
    $43 / hr Avg Bid
    187 bids

    I’m expanding my development team with a dedicated encryption authority who can take ownership of all cryptographic decisions and implementation details. We’re already integrating AES, RSA and Elliptic Curve Cryptography (ECC) into our stack; what we need now is someone who can guide the work, spot weaknesses early, and translate cryptographic theory into production-ready code that the whole team can understand and maintain. Beyond writing rock-solid routines, you’ll review the existing encryption layer, explain best practices in plain language to the other engineers, and stay available for quick consults as features evolve. A passion for secure key management, side-channel resistance and performance optimisation will make you a perfect fit. Deliverables I’...

    $27 / hr Average bid
    $27 / hr Avg Bid
    10 bids

    I need a concise yet academically...so a final-year undergraduate can follow it. • Include a fully worked numerical example showing all relevant modular-exponentiation calculations. • Analyse advantages and limitations, clearly stating why the scheme is secure (discrete-log problem) and where it is vulnerable (small prime groups, man-in-the-middle, quantum threats). • Compare Diffie-Hellman with RSA, AES, and lightweight cryptography (LWC), noting when each is preferred. Target length is about 1,200–1,500 words. Please deliver the text in an editable format (Word or LaTeX) along with a compiled reference list. I’ll consider the task complete once the introduction slots cleanly into my template, citations resolve correctly, and all five content point...

    $185 Average bid
    $185 Avg Bid
    22 bids

    I have a challenge-style cryptography question that ends with a hidden flag. I need someone to fully decrypt the message, capture the flag, and write a clear, reproducible report. Scope • Analyse the ciphertext, identify the probable encryption scheme, and perform the full decryption process. • Document every step you take—commands, tool settings, scripts, or manual reasoning—and include a screenshot after each major action. • Add a concise note under each screenshot explaining what was done and why it worked. • Conclude with the recovered flag and a short summary of lessons learned. The report must be self-contained, easy to follow, and delivered in PDF (screenshots embedded) plus any scripts you create. Feel free to use tools such as Cyber...

    $116 Average bid
    $116 Avg Bid
    17 bids

    I’m building a new blog that spotlights tomorrow’s technologies, and I’d like to kick things off with a series of ...reshaping everyday life. • Original content only, optimized for on-page SEO (compelling headlines, sub-headings, meta description, and a handful of relevant keywords). • A short takeaway section at the end of every article to encourage shares and discussion. Optional room to grow: once the AI series is live, I may branch into Quantum Computing (with pieces on Quantum Algorithms, Hardware, and Cryptography), so a writer comfortable with both fields is a plus. I’ll provide target keywords and a simple style guide; you deliver the polished drafts in Google Docs, ready for publication. If you enjoy translating complex tech into ...

    $20 / hr Average bid
    $20 / hr Avg Bid
    126 bids

    ...Detection: When external applications attempt to access monitored ALs, MERCURY will trigger a real-time voice warning using Text-to-Speech (TTS) APIs. 7. Smartcard-to-Server Self-Authentication: Prior to any deployment or configuration, a mutual cryptographic authentication must be performed between the Smartcard and the secure deployment server. This handshake shall use Elliptic Curve Cryptography (ECC) or RSA 4096-bit keys, facilitated through challenge-response protocols to ensure the identity of both parties and prevent impersonation or replay attacks. Project will be considered complete once the app, server and Smartcards are ready to be produced onsite and deployed....

    $28807 Average bid
    NDA
    $28807 Avg Bid
    19 bids

    I’m putting together a Jeopardy-style Capture-the-Flag event and need a collection of fresh, advanced-level puzzles. The board will cover three core categories—Cryptography, Forensics, and Web Exploitation—so every challenge you craft should push seasoned players while staying fair and solvable. Here’s what I expect to receive: • 10–12 original challenges evenly split across the three categories • A short story-style prompt for each task, the exact flag format, and the intended solve path • An accompanying write-up that explains the solution in detail (commands, tools, or scripts used) • Any necessary artifacts: PCAPs, vulnerable web apps, encrypted files, or compiled binaries • A quick validation script or manual step...

    $126 Average bid
    $126 Avg Bid
    7 bids

    I’m putting together a new Jeopardy-style Capture-the-Flag event aimed squarely at seasoned competitors. I need a full suite of original, high-difficulty tasks across three pillars—Cryptography, Reverse Engineering, and Web Exploitation. Each challenge must include a clear flag format, an authoritative write-up explaining the intended solve path, and any auxiliary files, binaries, or dockerised services needed for local testing. What I’ll count as a complete delivery: • 3-5 Cryptography puzzles featuring modern primitives or clever protocol flaws, each solvable without brute-forcing. • 3-5 Reverse Engineering binaries (Linux or Windows PE) that showcase obfuscation, unusual calling conventions, or anti-debug tricks. • 3-5 Web Exploitati...

    $115 Average bid
    $115 Avg Bid
    13 bids

    ...• Encrypted audit trail generation (PDF + AWS S3) • Basic dashboard for API usage logs • API key management and rate limiting • Optional: Stripe or Paddle integration for subscription billing Preferred Tech Stack • Backend: Python (FastAPI) or Node.js • Cryptography: liboqs (Open Quantum Safe), TLS 1.3 hybrid • ZK Proofs: Circom or Noir • Storage: AWS S3 • Deployment: Docker + Hostinger KVM 4 or AWS EC2 • Monitoring: Prometheus or Datadog Before We Proceed, Could You Confirm: 1. Have you worked with post-quantum cryptography (Kyber, Dilithium) or liboqs before? 2. Are you comfortable building modular APIs with secure endpoints and encrypted audit trails? 3. Would you be open to integrating zero-knowledge proof sys...

    $2127 Average bid
    $2127 Avg Bid
    83 bids

    ...Module 14: Access Control Lists (ACLs) Introduction and Configuration Mitigation Techniques Module 15: Firewall Technologies Securing Networks with Firewalls Firewall Design and Best Practices Module 16: Zone-Based Policy Firewalls (ZPF) ZPF Overview, Operation, and Configuration Module 17: Cloud Security Virtualization and Cloud Computing (Parts 1 & 2) Module 18: Cryptography Applications and Impacts of Cryptography Module 19: Technologies and Protocols Monitoring Common Network Protocols Module 20: Network Security Data Types and Handling of Security Data Module 21: Evaluating Alerts Overview and Methodologies for Alert Evaluation Module 22: Governance and Compliance Cybersecurity Ethics, Regulations, and Standards Module 23: Network Security Test...

    $24 / hr Average bid
    $24 / hr Avg Bid
    5 bids

    ...blockchain languages * Familiarity with frameworks such as , , Truffle, or Hardhat * Understanding of consensus mechanisms, DeFi, NFTs, or token standards (ERC-20, ERC-721, ERC-1155) * Ability to write clean, secure, and maintainable code * Strong problem-solving and communication skills **Nice to Have:** * Experience with Layer 2 solutions and cross-chain bridges * Knowledge of cryptography and security protocols * Previous work with DAO, staking, or yield farming projects **Project Type:** Freelance / Remote **Budget:** [Insert your budget range here] **Duration:** [Specify fixed-term / ongoing / milestone-based] **How to Apply:** Please share: 1. Your past blockchain projects (GitHub/Portfolio/Links). 2. Relevant experience in smart contracts or DApps. 3. Your availabilit...

    $9 / hr Average bid
    $9 / hr Avg Bid
    10 bids

    I have a standing stream of classwork that drops every week in my cybersecurity program and I need someone who can reliably handle it from start to finish. The workload usually rotates among concise research papers (properly referenced), hands-on problem-solving tasks, and small programming exercises or mini-projects. Topics so far have included network security fundamentals, core cryptography concepts, and scripting with JavaScript, VBScript, Windows shell, Python, and SQL, so comfort moving between theory and code is essential. What you will actually deliver each week: • A polished research paper or essay when theory is being examined (APA/IEEE citations as required by the prompt). • Fully worked solutions for the problem sets, showing all steps or reasoning. &bul...

    $183 Average bid
    $183 Avg Bid
    48 bids

    Top cryptography Community Articles