Decryption base64 jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,000 decryption base64 jobs found, pricing in CAD

    Write a simple app to demonstrate work of CCM AES security algorithm used in ZigBee protocol. Proof-of-concept. No GUI required. Preferable languages: C, C++, Python. Any library can be used. Primary focus on decryption. Inputs: - Nonce for initialization vector - 128-bit security key - cyphertext Output: - cleartext

    $246 (Avg Bid)
    $246 Avg Bid
    8 bids

    ...the program) and write the encryption and decryption results to “”. Please check the attached sample files “” and “”. In “”: 1. First line is the coefficients of an irreducible polynomial m(x) (degree is 8) over Z2, from the leading coefficient to the constant term, separated by one blank space. 2. Second line is the key (in hexadecimal format, 32 digits, without blank space). 3. Third line is the plaintext (in hexadecimal format, 32 digits, without blank space). 4. Fourth line is the ciphertext (in hexadecimal format, 32 digits, without blank space). In “”: 1. First line is the ciphertext (encryption result of the plaintext in ). 2. Second line is the plaintext (decryption result of the cipherte...

    $64 (Avg Bid)
    $64 Avg Bid
    26 bids

    Hello to FreeLancer Coders, I have an Expert Advisor File (EA) and it's extension .ex4 , this file is an expert advisor that work on Meta Trader 4. This EA is Locked & Encrypted so i can't use it anymore and i really need someone who has Good experience in this field. Again Only Coders who have Good knowledge on how to UNLOCK & DECRYPT .ex4 files and EA files can bid on my post. i don't need someone who just don't know what is EA and .ex4 and don't know how to Unlock this file. This job is so small and don't need too much time of work for the one who know how to do it correctly & professionally. WHO should BID here should define how much time it needs to unlock the file and NOTE (I have to try first the EA file and see the source code and...

    $18 / hr (Avg Bid)
    $18 / hr Avg Bid
    2 bids

    we are converting a mining pool from bitcoin to zcash it looks like the script is failing at decryption of the address. In the stratum-mining/lib/ script. If some would be willing to help debug this issue and possibly fix the decryption of the address that would be fantastic. BTC or ZEC reward on top of payment will be appointed upon success.

    $36 (Avg Bid)
    $36 Avg Bid
    3 bids

    Hi, I have a project in class where I have to find someones password to enter in their Excel file. They gave me their N and E, their message and now I have to decrypt that message because that is their password.

    $40 (Avg Bid)
    $40 Avg Bid
    5 bids

    Need someone to bugfix a secure ...implemented, the app itself is working fine, till encryption was implemented, the message gets encrypted, BUT receiving phone is not able to decrypt, so the job is to find the bug and fix it as fast as possible, this should be a simple task for the right guy. Additional information: Public key is used for encryption and private keys used for decryption. besides public and private keys: The sender of a message enters a key, same key must be used for decryption, i imagine that's the problem, but i dont know. The Application is programmed in android studio. A freelancer already wasted over a month of my time on this, so must be fixed FAST, so please if you can not start straight away or dont have the skills to do this, simply D...

    $343 (Avg Bid)
    $343 Avg Bid
    3 bids

    Wanted to decrypt Joomla Password. Pay $100--150/each. For qualification verification, I have created a password and copied the password hash here, you can request more info if you need, please decrypt the hash below and pm me the password, this is to ensure that you really know how to decode. $P$Bg4T8pYDkHOPllwQIDk7uuVRLDblTF1 $P$BI9X4gi2ziGchOaE8/99AXw5xUMUdz/ $P$Bomr1dqmU...password and copied the password hash here, you can request more info if you need, please decrypt the hash below and pm me the password, this is to ensure that you really know how to decode. $P$Bg4T8pYDkHOPllwQIDk7uuVRLDblTF1 $P$BI9X4gi2ziGchOaE8/99AXw5xUMUdz/ $P$Bomr1dqmUnSKNeob9BKs67onCPZ4lv/ $P$ $P$Bg4T8pYDkHOPllwQIDk7uuVRLDblTF1 I need 50 Hashes decryption.

    $5117 (Avg Bid)
    $5117 Avg Bid
    14 bids

    Using Licode, (the open source webRTC solution from Lynckia ()) we needto create a series of step by step tutorials for functional demos & solutions -local and cloud-based (dockerized) for videoconferincing with screen sharing, video recording and data-stream (base64), including coTURN service for behind-firewalls operations.

    $1532 (Avg Bid)
    $1532 Avg Bid
    9 bids

    ----> PLEASE READ THOROUGHLY BEFORE BIDDING <---- I need someone that is familiar with decoding complex 3D CAPTCHAS. I need an API style PHP script that can accept a base64 post request and return a plain text answer of the captcha with an accuracy rate of 90% or above. I have attached 5 samples. Please DO NOT bid on this project if you are not familiar with captcha/image manipulation and text extraction. These are not simple captchas and will require a complex algorithm to decode.

    $721 (Avg Bid)
    $721 Avg Bid
    15 bids

    ...shop_photo3, String shop_photo4, String shop_photo5, String shop_photo6, Add / create columns in the table 'users' for latitude and longitude, and update columns value with input parameters. Add / create columns in the table 'users' for shop_photo1, shop_photo2, shop_photo3, shop_photo4, shop_photo5, shop_photo6 function input parameter for these value is base64 string, you have to create image file on path webroot/img/uploads/shop/'imagename'."png"; (Please refer editphotofromapp function) , and put image file name in respective columns. If any of them string is empty then don't update column value. If image name is already present in given column then delete that image ...

    PHP
    $59 (Avg Bid)
    $59 Avg Bid
    4 bids

    Implement the Euclid algorithm in java . Your need to use a package for large number operations: 1. It finds the greatest common divisor between two numbers. int gcd(int a, int b)// it returns gcd(a,b). 2. It computes the inverse element: int inverse(int a, int m)// it...digits. Run your program on numbers less than 1000. What is the probability to give the wrong answer? Implement the RSA with java. You need to use a package for large number operations: 1. It should be able to find a public key given a private key 2. It has an efficient way to compute the exponential function. 3. It can select large two prime numbers 4. It can do both encryption and decryption. You need to use the modules in problems 3 and 4 . Print out your source code and provide sufficient your tes...

    $27 (Avg Bid)
    $27 Avg Bid
    1 bids

    Basically I need someone to do a builder using either C++, C#, .NET, or Python to build a microsoft macro The builder's options are: 1. Select a binary (exe) 2. Select encoding schemes (ASCII, Hex, Base64) 3. Select the location where to drop the exe after recompile it 4. Build option to build the macro in a text file ready to be pasted inside a word macro Basically the idea of the vbscript is to encode the binary into the encoding schemes mentioned stored to a variable, then decode the encoding to binary and store it to a different variable. Use the stored binary variable to write the content of the variable to the machine in which to run the macro in and run it in hidden format (vbHidden) Thanks

    $41 - $342
    $41 - $342
    0 bids

    Hello, This project is very easy. Beginners can do this task. The 4 images can be encode in data:image/png;base64 The titles style must be keep as Word model. Thank you for your proposals.

    $42 (Avg Bid)
    $42 Avg Bid
    43 bids

    Looking for someone to write a library for CodeSys v3 (e!cockpit in WAGO). I need two functions. One to encrypt and second to decrypt STRING(512) variable with use of AES-256 method. Output variable shall be STRING(256) as well. Encryption Key shall be STRING type Used language suppose to be ST with use of libraries available in WAGO e!cockpit. Project is about to convert existing program written in C language to ST language - with use of only standard libraries so it can be imported into WAGO e!cockpit or CoDeSys 2.3. Example of source code to be converted can be found on Project has been partially converted (can send project to interested engineer).

    $109 (Avg Bid)
    $109 Avg Bid
    4 bids

    Look at the solution of this post: I want to use this function with base64-encoded images of type JPG, PNG, GIF like this: newBase64 = resizeBase64Img(oldBase64, 100, 100); Note: My example does not work >> I need such a function which returns the resized image as base64 (or sets the value of newBase64 using a callback or whatever). I will choose a freelancer in about 12 hours when I'm back in office.

    $57 (Avg Bid)
    $57 Avg Bid
    7 bids

    I'm using this library: I want to send the following compressed base64-data to a PHP-script with an AJAX-request: var data = ('bPb8Pz89Pz1gKSYlJSLnKg=='); Your job: 1. Create the necessary JS-Script which sends the data to a PHP-script 2. Create a PHP-script which decompresses and saves this base64-data into a file

    $64 (Avg Bid)
    $64 Avg Bid
    9 bids

    ...ticketing and invoicing, but is weak regarding timesheets. I currently use a web-based tool called Toggl for timesheeting. Toggl has an API, and I have some VBA code that automatically creates customers and projects in Toggl from Excel. It's pretty simple code, which you can see in the attached screenshot (that's all of the code, minus a helper class to handle JSON encoding, and another to handle base64 encoding, neither of which we'll need to worry about in PHP). I'm after someone to implement the same code in Perfex. Ie: * Given a client ID and name in Perfex, you need to add a function to create that client in Toggl. Your function should return the Toggl client ID and save it to the Perfex database. * Given a project ID, project name, and client ID in ...

    $204 (Avg Bid)
    $204 Avg Bid
    14 bids

    Please Sign Up or Login to see details.

    Featured Urgent Sealed NDA

    I want someone to design a Microsoft Macro that basically runs an executable which is included in the Macro as either Hex or ASCII or even base64 and run it.

    $164 (Avg Bid)
    $164 Avg Bid
    7 bids

    I need someone who can solve this problem: Your job: Create an example-page which: 1. Encodes an image into a base64-string 2. Then a JavaScript-Function decodes the base64-string into binary data 3. Then it sends this binary data to a PHP-Script using $.post(....) 4. Then the PHP-Script saves the image as a file on the server

    $5792 (Avg Bid)
    $5792 Avg Bid
    27 bids

    Write two computer programs to simulate an Unicode stream cipher that consists of both encryption and decryption algorithms. The encryption program accepts inputs from an existing text file, called “letter.txt.” The encryption program produces an output ciphertext file, called “secret” The decryption program takes “secret” as input and decrypts it into a plaintext, called “message.txt.” (Hint: the random “seed” must be known, but be kept secure, by the pseudorandom number generators in both encryption and decryption programs.) The program must run on java 6 and in command prompt/terminal

    $41 (Avg Bid)
    $41 Avg Bid
    5 bids

    Write two computer programs to simulate an Unicode stream cipher that consists of both encryption and decryption algorithms. The encryption program accepts inputs from an existing text file, called “letter.txt.” This can have anything in it. The encryption program produces an output ciphertext file, called “secret” The decryption program takes “secret” as input and decrypts it into a plaintext, called “message.txt.” (Hint: the random “seed” must be known, but be kept secure, by the pseudorandom number generators in both encryption and decryption programs

    $44 (Avg Bid)
    $44 Avg Bid
    7 bids

    Make a youtube audio video download api it should also work with protected videos like vevo, music videos, etc use cipher decryption for that. something like this:

    $231 (Avg Bid)
    $231 Avg Bid
    7 bids

    ...anywhere on the page. Or click a button and browse to the file in a file manager dialog. 2. The image file is immediately uploaded on mouse release (no clicks) 3. A progress bar shows the progress of the file upload 4. When the file upload is complete, convert the image file to a base64 string and store the string in an angular variable such as $ 5. Put the string into an <img src="stringHere"> element on the page so the user can see the uploaded image using the base64 string. Please make a function, directive or module that I can re-use on multiple pages throughout an app (eg, I just copy it into the new page, and it works). Please make it able to handle multiple inputs at different places on a page. For example, I might have one &q...

    $111 (Avg Bid)
    $111 Avg Bid
    12 bids

    ...anywhere on the page. Or click a button and browse to the file in a file manager dialog. 2. The image file is immediately uploaded on mouse release (no clicks) 3. A progress bar shows the progress of the file upload 4. When the file upload is complete, convert the image file to a base64 string and store the string in an angular variable such as $ 5. Put the string into an <img src="stringHere"> element on the page so the user can see the uploaded image using the base64 string. This script is for commercial production use. If using an existing library (eg from Github), please include a reference to the Source. Please use open source, DO NOT copy a commercial product. Please use Twitter Bootstrap for CSS if the library you use ...

    $157 (Avg Bid)
    $157 Avg Bid
    9 bids

    I need an Angular version of this page: 1. The user can drag and drop an image anywhere on the page. 2. The image file is immediately uploaded on mouse release (no clicks) 3. A progress bar shows the progress of the file upload 4. When the file upload is complete, convert the image file to a base64 string. 5. Put the string into an <img src="stringHere"> element on the page so the user can see the uploaded image using the base64 string. This script is for commercial production use. If using an existing library (eg from Github), please include a reference to the Source. Please use open source, DO NOT copy a commercial product. Please use Twitter Bootstrap for CSS if the library you use does not have CSS included. NO JQUERY!!! (Sorry, j...

    $25 (Avg Bid)
    $25 Avg Bid
    1 bids

    I need an Angular version of this page: 1. The user can drag and drop an image anywhere on the page. 2. The image file is immediately uploaded on mouse release (no clicks) 3. A progress bar shows the progress of the file upload 4. When the file upload is complete, convert the image file to a base64 string. 5. Put the string into an <img src="stringHere"> element on the page so the user can see the uploaded image using the base64 string. This script is for commercial production use. If using an existing library (eg from Github), please include a reference to the Source. Please use open source, DO NOT copy a commercial product. Please use Twitter Bootstrap for CSS if the library you use does not have CSS included. NO JQUERY!!! (Sorry, j...

    $21 (Avg Bid)
    $21 Avg Bid
    6 bids

    1. Write two computer programs to simulate an Unicode stream cipher that consists of both encryption and decryption algorithms. The encryption program accepts inputs from an existing text file, called “letter.txt.” The encryption program produces an output ciphertext file, called “secret” The decryption program takes “secret” as input and decrypts it into a plaintext, called “message.txt.” (Hint: the random “seed” must be known, but be kept secure, by the pseudorandom number generators in both encryption and decryption programs.)

    $129 (Avg Bid)
    $129 Avg Bid
    10 bids

    ooking for someone to write a library for CodeSys v3 (e!cockpit in WAGO). I need two functions. One to encrypt and second to decrypt STRING variable with use of AES-256 method. Used language suppose to be ST with use of libraries available in WAGO e!cockpit. Project is about to convert existing program written in C language to ST language - with use of only standard libraries so it can be imported into WAGO e!cockpit. Example of source code to be converted can be found on

    $116 (Avg Bid)
    $116 Avg Bid
    3 bids

    Need someone to bugfix a secure chat app we made, it's coded in native android code, the app is using RSA 1024 bit encryption, the app is a phone to phone encrypted chat app, and is made with a lot of other security measures implemented, the app itself is working fine, till encryption was implemented, the message gets encrypted, BUT receiving phone is not able to decrypt, so the job is t...and is made with a lot of other security measures implemented, the app itself is working fine, till encryption was implemented, the message gets encrypted, BUT receiving phone is not able to decrypt, so the job is to find the bug and fix it as fast as possible, this should be a simple task for the right guy. Additional information: Public key is used for encryption and private keys used for d...

    $270 (Avg Bid)
    $270 Avg Bid
    6 bids

    Create a WebSocket server as a Visual C++ (not C# or .NET) project to build in Visual Studio 2008 and run under Windows XP or higher. Code can be either C or C++ or a mixture of both. Can use Windows st...handshake accept to the WebSocket opened by the attached HTML5 page. (This page is the sample one posted on ) Change the value of wsUri to something like 'ws://localhost/YOUR_APP_NAME:YOUR_PORT'. Definition of success: While your app is running, the sample page viewed in Chrome Version 23 or higher displays "RESPONSE: WebSocket rocks". For the SHA-1 hash and Base64 encryption required to implement the WebSocket handshake protocol, use any available free, GPL, or MIT licensed code. Contact me with any questions about the scope of this project. -Steve

    $809 (Avg Bid)
    $809 Avg Bid
    13 bids

    Im looking for a SDK where I can send it An image in base64 string and it should detect all skin color or skin frames in the image And it should return be the information, or change some skin colors

    $2873 (Avg Bid)
    $2873 Avg Bid
    5 bids

    FileCreator Pro is an idea to create a custom file formats and names with encryption and decryption. I made a custom beta SSL for my application that's keep the hacker away. this application is made by 1 person and 16 years old . That's LOL.

    $543 (Avg Bid)
    $543 Avg Bid
    4 bids

    Dear Bumeen, We are need your help to fix some small issues in the core of our website and integrate the encryption library in...“encrypted encryption key” c. When user download a file, we will to send back the “encrypted encryption key” to their browser, then decrypt it with their plain password => so we have the “decryption key” or the plain form of the encryption key that we generated in the step a) d. When user share a file, we need also send back the encrypted key to their browser, then decrypt it with their password and add the decryption_key into the sharing-link in form: when another user download a file, we will use this decryption key to decrypt the file Thanks & regards,

    $332 (Avg Bid)
    $332 Avg Bid
    5 bids

    Dear Bumeen, We are need your help to fix a small issue in the core of our website and integrate the encryption library into our website. Please check ...the “encrypted encryption key” c. When user download a file, we will to send back the “encrypted encryption key” to their browser, then decrypt it with their plain password => so we have the “decryption key” or the plain form of the encryption key that we generated in the step a) d. When user share a file, we need also send back the encrypted key to their browser, then decrypt it with their password and add the decryption_key into the sharing-link in form: when another user download a file, we will use this decryption key to decrypt the file

    $41 - $342
    $41 - $342
    0 bids

    High bids will be ignored :) The task is very easy and fun: Look in the attachment for good understanding A) Panel: * Dynamic panel * 1- must have good gui 2- must organize the output in good GUI 3- must have admin password [ REQUIRE SESSI...pwd ]. The send commands have options before I send , like if I want to pick a specific php execution function in the receiver file to do it. for example : exec, shell_exec , passthru, system , and all other possibilities. B) Receiver: * Dynamic Receiver * ** VERY IMPORTANT *** it must be really small code and try to make it really smart to be really small and few lines. 1- include decryption algorithm in it. 2- execute commands and send the output to panel. 3- send and receive the commands from the Accept-Languag...

    $215 (Avg Bid)
    $215 Avg Bid
    13 bids

    Hello, We need a software or application to be designed to play the encrypted video file freelancer should be having idea about video encryption,decryption and octet-stream decryption is a .app file.

    $624 - $1248
    $624 - $1248
    0 bids

    Hello, we want video encryption expertise freelancer to work on MIME application octet-stream video encryption/decryption. please see attached video for reference.

    $508 (Avg Bid)
    $508 Avg Bid
    2 bids

    Looking for a C Programmer who can complete a simple encryption & decryption program immediately. Looking for a programmer who can complete this small program ASAP before September 11, 2016. It is a micro project. Kindly reach out to me for further details with your expectation in term pay. Project Type: One-time project

    $38 (Avg Bid)
    $38 Avg Bid
    3 bids

    ...will poll a folder on an SFTP site at a set frequency, on a new file being identified the file will be moved from the SFTP site to a folder on a file server (UNC path). The above tasks may have multiple instances, so that files can be moved from different locations/SFTP sites if required. Ideally using free software such as Filezilla, putty etc Milestone 2: File transfer with encryption /decryption Similar to Milestone 1, but files need to be encrypted before sending to the SFTP using a PGP key. Files being received from the SFTP need to be decrypted after being moved to the Windows Server. Further details will be provided for this milestone to the successful freelancer. You will not be given access to the server or be given the SFTP details, so instructions will b...

    $487 (Avg Bid)
    Urgent
    $487 Avg Bid
    5 bids

    It is a simple java project to encrypt and decrypt small as well as large text file using Elliptic Curves and Diffie-Hellman algorithm. Key management will also be considered in the project. Also have to evaluate the implementations, correctness, efficiency and performance impact on the operating system.

    $90 (Avg Bid)
    $90 Avg Bid
    16 bids

    CRACKING A CIPHER (30 points) Choose a substitution cipher and call it CIPHER. Write a C program that implements your CIPHER. Write a C program CRACKER that uses the letter frequency count method to decrypt the ciphertext generated by your CIPHER. CRACKER should take as input a ciphertext ctext generated by CIPHER and return a "decrypted" form of ctext. The decryption is not expected to be perfect! You may hard code your input plaintext or read it from a file. Your CIPHER and CRACKER should not remove blanks, capitalizations, and punctuation marks! You do not have to encrypt digits. A table containing the relative frequencies of English letters can be found at ~mec/2003-2004/cryptography/subs/frequencies.html. (10 points- Written) Answer the following questions:

    $41 (Avg Bid)
    $41 Avg Bid
    1 bids

    Simple C string encryption/decryption!

    $150 (Avg Bid)
    $150 Avg Bid
    3 bids

    ...the public key to encrypt the message, this key will be in base64 format, therefore need to be "base64_decode") From : This is encrypter public key in base64 format(need to stay in base 64) Message: This field is for encrypter to enter is message or data to be encrypted Expiration: this need to be a scroll down box choose as follow: 5min / 15min /30min / 1h / 3h / 6h / 12h / 1D / 3D / 7D / 1 Month / 6 month / Never "DEFAULT SHOULD BE 3D" Then a bottom SEND The script need to encryp Field data of FROM: MESAGE: with the field name. then the script need to encode it in base64_encode Expiration should be calculated as time()+"the seclection time) then info need to enter in a mysql data such as: Address to (in base64 format)...

    $200 (Avg Bid)
    $200 Avg Bid
    12 bids

    Implementing algorithm is called “Do not Trust My Partner” (DTMP) for Key refer the file "" Next is AES Rijndael encryption but using DTMP key generation algorithm Implementation of AES Rijndael encryption/decryption java algorithm ,you can easily get in google. To understand the how Neural Cryptography works,please refer the PDF file <<>>. Get the actual feel by running the project My budget is max 70 USD.

    $63 (Avg Bid)
    Urgent
    $63 Avg Bid
    12 bids

    i need someone who understand this project and can describe to us how its work for future development we prefer using CUDA in GPU and OPENMPI in CPU also we encryption and decryption any data (prefer video)

    $516 (Avg Bid)
    $516 Avg Bid
    3 bids

    ...into blocks of size t. Recall that within each block, the Vigen`ere cipher works by encrypting the ith character with the ith key (using a basic cipher). Letting the key be k1, . . . , kt, this means the ith character in each block is encrypted by adding ki to it, modulo 26. The proposed modification is to encrypt the ith character in the jth block by adding ki + j modulo 26. (a) Show that decryption can be carried out. (b) Describe the effect of the above modification on Kasiski’s attack. (c) Devise an alternate attack that works better than Kasiski’s attack....

    $90 (Avg Bid)
    $90 Avg Bid
    1 bids