Decryption base64 jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,000 decryption base64 jobs found, pricing in CAD

    ...QoS levels per queue - implement a springboot MQTT listener (push notification) which fetches incoming MQTT messages - implement a schedule based MQTT fetcher (pull notification), which works as a fallback, if the MQTT listener is failing - persist the full message details decoded into the database (all transport details, all headers, full decoded payload, along with the full binary message as base64 CLOB) - on startup of app, the schedulers and the listener shall be auto registered The java console application must be primarily operable on a Linux system, though it should also function flawlessly on Windows and MacOS for such developers by defaulting as Java ability (best practices) on all operating systems. Strong Java programming skills, expertise in working with MQTT and me...

    $192 (Avg Bid)
    $192 Avg Bid
    15 bids

    ...interface to life. Having made progress on the tool, I need your expertise to add the finishing touches. From a given HTML file, I aim to develop a functional image editor similar to Instagram Stories upload. Currently, the file utilizes Vanilla JS, jQuery, Bootstrap, and Konva JS. The existing functionality is rudimentary: users can add a draggable image, insert draggable text, and save it as a base64 image. We seek to enhance these features. The desired improvements include: Adding a button "x" that triggers the function call goBack. Introducing a new layer when inserting text, allowing users to edit, resize, change color, delete, or confirm the text. Providing the option to add selected PNG icons, enabling users to choose from a list and incorporate them into the...

    $729 (Avg Bid)
    $729 Avg Bid
    84 bids

    I'm seeking an experienced developer to create a robust Digital Rights Management (DRM) platform focused on safeguarding sensitive documents. Here are my key needs: - **Content Security** - Implement powerful encryption and decryption modules to ensure document protection. Every file should be virtually impenetrable by unauthorized users. - **Access Control** - Develop a comprehensive system to support user, group, and role-based permissions. This will dictate how access is granted and what level of document interaction is permitted. - **Monitoring Usage** - An essential function is the ability to track and report how the documents are being used. Real-time reporting capabilities would be ideal to monitor access and prevent misuse. - **License Management** - Althoug...

    $1237 (Avg Bid)
    $1237 Avg Bid
    16 bids

    ...User Creation/Authentication, including: via email/phone (with password recovery), and 3rd Party Logins such as Google, Facebook and AppleID. Highest level of security standard for App Stores. - Notification System - Simple Forms for user input, before POST request to existing API. - Image Capture UI (media stream), with validation tips, overlays, and capture button. Captured image is encoded into Base64, and sent to API endpoint, error handling will be necessary from the possible returned object. - Mapping X,Y (pixel values) points onto an image, and creating an interface to allow for user to adjust these dots, updating the data (X,Y as integers). - Plotting final returned JSON data onto a table. - Creating multiple data export (download) options including; CSV, and PDF/PNG rend...

    $243 (Avg Bid)
    $243 Avg Bid
    59 bids

    I'm in need of a skilled C# / Javascript developer wit...developer with a strong background in cryptography to help debug an Encryption and Decryption System using Elliptic Curve Integrated Encryption Scheme (ECIES) specifically for encrypting messaging content. Please note that code are already in place and task is just to debug and make sure it works. The successful candidate for this project will be someone who can efficiently integrate custom security protocols to enhance our platform's privacy and security features. **Essential Skills and Experience:** - Proficiency in javascript and C# programming - Expert understanding of cryptographic principles - Experience with ECIES or similar encryption methods **Project Objectives:** - ECIES encryption/decryption ...

    $121 (Avg Bid)
    $121 Avg Bid
    25 bids

    I'm in need of proficient cryptographic development assistance. My project revolves around various cryptography techniques, specifically: - Caeser cipher...cipher - Vigenere/Vigenere Tableue - Playfair matrix table I already have a determined key/shift value for the Caeser cipher. However, the need to include both encryption and decryption phases will be contingent on the question I provide. Ideal Skills & Experience: • Expert knowledge and experience with the listed cryptographic techniques • Proven track record with encryption and decryption processes • Ability to adapt to specific project needs and requirements • Excellent problem-solving skills Your job will be to assist in cryptography problem-solving, with the potential to handle both...

    $228 (Avg Bid)
    $228 Avg Bid
    3 bids

    ...methond 2. Pass below parameters to the payment gateway API a. Authorization - clientId, clientSecret b. Create Payment : the amount of the payment : the currency of the payment; currently only IQD is supported Response of the create payment would be as follows paymentId: A unique identifier of the payment, used later to check the status. qrCode: A base64-encoded data URL of the QR code image that the user can scan with the FIB mobile app. readableCode: A payment code that the user can enter manually in case he cannot scan the QR code. personalAppLink: A link that the user can tap on his mobile phone to go to the corresponding payment screen in the FIB Personal app. C. Check Payment Status Request: paymentId: Should be passed in the url path. Response:

    $226 (Avg Bid)
    $226 Avg Bid
    108 bids

    ...expanding its payment capabilities. Here's what I'm looking for: **Integration Requirements:** - Seamlessly incorporate HDFC UPI API. - Enable core functionalities: fund transfers, payment requests, and status checks. **Ideal Candidate:** - Proficient in PHP and Laravel framework. - Extensive experience with the HDFC UPI API. - Understanding of secure payment processes. - Must know Encryption and Decryption techniques for API request and response. - Ability to write clean, maintainable code. - Proven track record of successful API integrations. **Timeline:** - Immediate start with a priority on rapid turnaround. Your expertise will pave the way for a more robust and user-friendly service. If you can deliver with precision and speed, I invite you to bid on this proje...

    $163 (Avg Bid)
    $163 Avg Bid
    16 bids

    I'm seeking a skilled developer for a unique challenge. Javascript/HTML expertise is key, with a precise focus on: • Image Representation: The project involves displaying png images stored in SQLite in a centered grid layout, one image per row. •Encoding: The images will be stored as Base64 encoded in the SQLite database. •Image Interaction: Critical aspect involves creating a hyperlink on a clickable (squared) area relative to the images. Additionally, a comment-widget that stores editable, image-related comments in the database is necessary. DB, js/css is within a folder (same name as the HTML file). Minimal content/code within HTML file Ideal candidates would have previous experience in similar tasks and a good understanding of SQLite and image manipula...

    $218 (Avg Bid)
    $218 Avg Bid
    51 bids

    ...code is retained. Key Project Details: - Python code file exceeds 500 lines. - The code's primary function has been to convert file formats. - Uncertain about specific functionalities or libraries. What I'm Looking For: - Professional expertise in Python programming. - Experience with code conversion or decryption. - Ability to troubleshoot and preserve code functionalities. - Familiarity with different Python libraries. Ideal Skills: - Proficiency in Python and file encryption/decryption. - Strong problem-solving capabilities. - Experience in maintaining code integrity post-conversion. - Excellent communication skills to assist in identifying specific requirements. Final Deliverables: - Successfully converted Python script (.py or text format). - Preservatio...

    $16 (Avg Bid)
    $16 Avg Bid
    8 bids

    ...Tasks: - Decrypt current version of firmware - Extract older version of firmware via ST-Link - Implement the older version in the MCU The successful freelancer should be proficient in UART and MCU firmware updates, and should have experience with ST-Link and STM32F103C8T6 specifically. Skills and Experience: - ST-Link firmware extraction - Familiarity with STM32F Series - UART sniffing and decryption - Firmware downgrading and updating The aim of this project is to improve the easiness of control and compatibility with older software, rather than bug fixing or security enhancement. New FW can't be read already from MCU by ST-link. (protection could be already in,,, Boot0 can't be set high, its gnd also) In UART FW update sniff: Last 4 byte CRC-16/XMODEM checksum F...

    $158 (Avg Bid)
    $158 Avg Bid
    19 bids

    ...QoS levels per queue - implement a springboot MQTT listener (push notification) which fetches incoming MQTT messages - implement a schedule based MQTT fetcher (pull notification), which works as a fallback, if the MQTT listener is failing - persist the full message details decoded into the database (all transport details, all headers, full decoded payload, along with the full binary message as base64 CLOB) - on startup of app, the schedulers and the listener shall be auto registered The java console application must be primarily operable on a Linux system, though it should also function flawlessly on Windows and MacOS for such developers by defaulting as Java ability (best practices) on all operating systems. Strong Java programming skills, expertise in working with MQTT and me...

    $80 (Avg Bid)
    $80 Avg Bid
    9 bids

    I'm seeking a highly skilled Verilog engineer to design and implement an AES encryption and decryption system. This project has been initiated with the purpose of ensuring data security and as such, the successful applicant must be experienced in the field of cryptography. Proficiency in Verilog and a clear knowledge of encryption methods, particularly AES, are crucial for the success of this project. In your application, kindly provide: - Details of your past experiences related to Verilog - Any relevant project proposals you've worked on, showcasing your proficiency in developing AES systems. The deadline for completion of the project will be within one month. Please keep this timeframe in mind as you consider your application and potential schedule. I am excited to...

    $536 (Avg Bid)
    $536 Avg Bid
    8 bids

    ...cryptography algorithms. My task of my thesis is to choose some typical use cases for homomorphic encryption, then implement these use cases in at least three homomorfic encryption frameworks and run some benchmarking, eg number of operations at once, memory/CPU usage, throughput of those frameworks. Requirements: - Evaluate homomorphic cryptography - Benchmark arithmetic operations, data encryption/decryption, and data processing tasks. - Present findings with clarity and precision. Ideal Skills: - Proficiency in cryptography, specifically homomorphic encryption. - Experience with benchmarking and performance analysis. - Strong analytical and reporting abilities. - Familiarity with common cryptographic software and tools. This project is not only a technical task but an oppo...

    $52 / hr (Avg Bid)
    $52 / hr Avg Bid
    10 bids

    I'm looking for an experienced JavaScript developer well-versed in the SHA256 algorithm and CryptoJS library. This entails crafting effective code to decrypt using an Initialization Vector (IV) and Key. While predominantly JavaScript, this project is client-side. Key R...library. This entails crafting effective code to decrypt using an Initialization Vector (IV) and Key. While predominantly JavaScript, this project is client-side. Key Requirements: * Proficiency in JavaScript * Experience with CryptoJS or equivalent libraries * Strong understanding of decryption processes With no particular preference for the version of CryptoJS, your experience and expertise can guide the most suitable selection. Through providing your input, we can ensure the optimal operation of our ...

    $138 (Avg Bid)
    $138 Avg Bid
    45 bids

    ...QoS levels per queue - implement a springboot MQTT listener (push notification) which fetches incoming MQTT messages - implement a schedule based MQTT fetcher (pull notification), which works as a fallback, if the MQTT listener is failing - persist the full message details decoded into the database (all transport details, all headers, full decoded payload, along with the full binary message as base64 CLOB) - on startup of app, the schedulers and the listener shall be auto registered The java console application must be primarily operable on a Linux system, though it should also function flawlessly on Windows and MacOS for such developers by defaulting as Java ability (best practices) on all operating systems. Strong Java programming skills, expertise in working with MQTT and me...

    $89 (Avg Bid)
    $89 Avg Bid
    10 bids

    Hello im looking for an expert in CryptoJS that knows how to use AccountNumbers as Keys, IntiitalizationVectors and CipherText as Key in the function. Please chat to me if this sounds like you!

    $26 (Avg Bid)
    $26 Avg Bid
    7 bids

    The aim is to develop an app, where there are 3 main users customer,shop keeper and delivery person. The ...lock the document. Then a list of available shops are displayed and the customer selects shop and proceeds to payment. The password to the document is encrypted and sent to the shopkeeper and the key required to decrypt the password is sent to the delivery person. The delivery person can see list of all available deliveries and reaches the shop. In shop keeper interface we will provide a tab for decryption where the shop keeper enters the encrypted password he received and also the key which is present with the delivery person and gets the original password. Once the password is retrieved to unlock the document he will take out the print and delivery person will hand it over t...

    $527 (Avg Bid)
    $527 Avg Bid
    27 bids

    Project Description: I am seeking assistance in recovering my files that have been encrypted by ransomware. Sk...seeking assistance in recovering my files that have been encrypted by ransomware. Skills and Experience Required: - Experience in ransomware decryption - Knowledge of various types of ransomware and their decryption methods - Familiarity with the encryption algorithms used by ransomware - Proficiency in data recovery and file restoration - Strong understanding of computer systems and file structures - Ability to work efficiently and effectively to decrypt all types of files affected by the ransomware - Excellent problem-solving skills and attention to detail Please provide your expertise and previous experience in dealing with ransomware decrypti...

    $439 (Avg Bid)
    $439 Avg Bid
    14 bids

    This project is targeting experts in the field of mobile signal interception and decoding. ...surveillance and monitoring which is geared towards enhancing our security system. Expectations: - Specialize in interception and decoding of mobile telephone signals. - Utilize sophisticated techniques to provide an analysis of conversation content, not just basic call details. Required Experience and Skills: - Extensive knowledge in mobile communication and signal processing. - Proven experience in decryption or decoding techniques. - Previous work in surveillance or security systems is a must. - Ability to provide in-depth analysis of intercepted conversations. Kindly submit your proposal clearly stating your understanding of the project, your strategy, and your relevant skills and e...

    $845 (Avg Bid)
    $845 Avg Bid
    8 bids

    I’m search for a data miner , hacker and decryption expert to retrieve links for images stored in CFIEPUB format from a website. Also, it used token as a way to fetch the images .The site sells magazines and offers free samples, typically consisting of two pages of issues that span over 400 pages. My order is to obtain these images, ranging from the third to the last page of each issue. Specifically, I am interested in stable way to get the pages or the epub file.

    $343 (Avg Bid)
    $343 Avg Bid
    1 bids

    ...methond 2. Pass below parameters to the payment gateway API a. Authorization - clientId, clientSecret b. Create Payment : the amount of the payment : the currency of the payment; currently only IQD is supported Response of the create payment would be as follows paymentId: A unique identifier of the payment, used later to check the status. qrCode: A base64-encoded data URL of the QR code image that the user can scan with the FIB mobile app. readableCode: A payment code that the user can enter manually in case he cannot scan the QR code. personalAppLink: A link that the user can tap on his mobile phone to go to the corresponding payment screen in the FIB Personal app. C. Check Payment Status Request: paymentId: Should be passed in the url path. Response:

    $232 (Avg Bid)
    $232 Avg Bid
    58 bids

    I’m search for a data miner , hacker and decryption expert to retrieve links for images stored in CFIEPUB format from a website. Also, it used token as a way to fetch the images .The site sells magazines and offers free samples, typically consisting of two pages of issues that span over 400 pages. My order is to obtain these images, ranging from the third to the last page of each issue. Specifically, I am interested in stable way to get the pages or the epub file.

    $343 (Avg Bid)
    $343 Avg Bid
    1 bids

    I am looking for a developer to assist with 2x way data communication between ESP32 Micro-Controller and Python and JavaScript servers. I have working sample code and need someone to bring everything together and ensure all code works for all test cases. A...communication between ESP32 Micro-Controller and Python and JavaScript servers. I have working sample code and need someone to bring everything together and ensure all code works for all test cases. AES256 is used for encryption algorithm, while the HmacSHA256 for hashing algorithm. Key requirements: - Good understanding of ESP32 MCU, Python, and JavaScript - Good understanding of data encryption, decryption and hashing techniques, particularly using AES256 & HmacSHA256 It is a small project needs to be completed as soo...

    $86 (Avg Bid)
    $86 Avg Bid
    9 bids

    I am looking for a skilled MATLAB developer to modify an existing code for my research paper. I need the code to be modified in a new and innovative way to change the old location to a new location and also modify the substitution part in the encryption/decryption process. Skills and Experience: - Proficiency in MATLAB programming - Strong knowledge of encryption/decryption algorithms - Experience in modifying existing code - Ability to think creatively and come up with innovative solutions The ideal candidate should be able to deliver the modified code within 1 week.

    $38 (Avg Bid)
    $38 Avg Bid
    2 bids

    Title: Technical Analysis of the CIS-12 Signal (Demodulation, Decoding, Decryption) Project Description: I am looking for a skilled freelancer to perform a technical analysis of the CIS-12 signal. The goal of this analysis is to optimize the signal decoding process. Desired Outcome: - Optimize the signal decoding process for the CIS-12 signal Specific Requirements: - I have the CIS-12 signal waveform written and available for analysis Timeline: - The technical analysis should be completed within 2-3 weeks Skills and Experience: - Strong knowledge and experience in signal processing and analysis - Proficiency in demodulation, decoding, and decryption techniques - Familiarity with CIS-12 signal and its characteristics - Expertise in optimizing signal dec...

    $594 (Avg Bid)
    $594 Avg Bid
    9 bids

    I'm searching for a talented software developer who can create a program that runs on Windows and will convert voter lists from PDF to Excel. Essenti...runs on Windows and will convert voter lists from PDF to Excel. Essential features the software must have include: - The ability to convert multiple PDF files simultaneously - The capability to automatically decrypt password-protected PDF files Critical skills and experience for this project: - Proficient in software development, particularly for Windows OS - Experience with encryption and decryption algorithms - Understanding of PDF and Excel file formats - Excellent problem-solving abilities Please only bid if you have the necessary skills and are confident in delivering a usable, efficient software solution. Uploaded Sa...

    $388 (Avg Bid)
    $388 Avg Bid
    5 bids

    ...Description: Restore a Encrypted Database on Azure SQL Managed Instance - I am looking for a skilled professional who can help me restore an encrypted database on Azure SQL Managed Instance. The database has been encrypted using TDE (Transparent Data Encryption). - The client is not sure if they have the necessary decryption keys for the database, so the ideal candidate should have experience in handling TDE encryption and should be able to assist in verifying the availability of decryption keys. - The restoration of the database is not urgent, so there is no immediate deadline. However, the candidate should be able to complete the task within a reasonable timeframe. - The ideal candidate should have experience working with Azure SQL Managed Instance and should be familia...

    $18 (Avg Bid)
    $18 Avg Bid
    2 bids

    I'm seeking an adept Python developer to construct a high precision API for facial recognition. Aimed at identifying individuals, the API needs to be built using base64 images. Key tasks include: - Develop an API for facial recognition - Utilise base64 images in implementation The ideal freelancer will have: - Solid experience in Python and API development - Proven track record in facial recognition technologies - Knowledge of high-accuracy systems NOTE: Integration of the API to other systems won't be required. We'll manage this process internally. Accuracy of facial recognition is vital. Your ability to present past work of a similar nature will be highly beneficial.

    $23 (Avg Bid)
    $23 Avg Bid
    58 bids

    I am looking for a freelancer who can help me decrypt WhatsApp voice messages. I use an API that receives and send whatsapp messages. The voice messages are sent through the API with a link to access an .enc file anda a mediaKey to decrypt the file. I need an API that will receive ...API that receives and send whatsapp messages. The voice messages are sent through the API with a link to access an .enc file anda a mediaKey to decrypt the file. I need an API that will receive these informations (link to file and mediaKey) and will return the voice message decrypted, as a base64 Requirements: - Knowledge of encryption algorithms and techniques Ideal freelancer: - Has successfully decrypted WhatsApp voice messages in the past - Can provide examples or references of previous decryp...

    $163 (Avg Bid)
    $163 Avg Bid
    53 bids

    ...Testing Lab: Vulnerability Assessment Lab, Exploitation Techniques, Security Scanning techniques. • Forensic Lab: Disc imaging analysis, Memory forensic, incident response Offering tools and platforms for in-depth source code examination. • Wireless Security Lab: Simulate Wi-fi networks with security vulnerabilities, Bluetooth Security, and RFID Security. • Cryptography Lab: Encryption and Decryption Lab, Digital Signature Lab, Key Management etc. Training Center The physical Training Center within the CoE comprises dedicated labs and facilities: Features: • Expert-Led Training Sessions: Subject matter experts with experience levels ranging from 3 to 5 years, 5 to 7 years, 7 to 10 years, and more than 10 years will conduct specialized training s...

    $99 (Avg Bid)
    $99 Avg Bid
    18 bids

    I am looking for a JavaScript developer to create a unique hashing function. This function needs to return an input that is hashed in hex format with 64 characters long. The hash must come with a decryption function.

    $23 (Avg Bid)
    $23 Avg Bid
    25 bids

    ...Your task is to design and build a Crypt fud c++ software with the following features: - Exceptional encryption and decryption capabilities. - Compatibility with a wide range of platforms. While the client didn't specify, it's ideal for the software to be versatile across Windows, MacOS, and Linux for broader usability. To be considered for this project, please submit a detailed project proposal indicating how you plan to meet these requirements. In your proposal, highlight your expertise and experience in both Cryptography and C++ programming. Understanding of operating system platform variations is a bonus. Your approach to ensuring seamless encryption and decryption within the software's framework should be well detailed. Prior examples of similar wo...

    $6312 (Avg Bid)
    $6312 Avg Bid
    22 bids

    A user interface should open asking for four options encryption decryption digital signatures and verify when you select an option (example if u choose encryption) u should be able to choose a text file for encryption and give the output for doing these use RSA algorithm and PYTHON LANGUAGE RSA Algorithm for encrypting and decrypting a text file and digital signature and verifying the signature also should be able to generate AND SHOULD BE WILLING TO MAKE CHANGES IF I AM NOT OKAY WITH THE OUTPUT AND SHOULD BE SUITABLE FOR RUNNING ON WINDOWS

    $34 (Avg Bid)
    $34 Avg Bid
    2 bids

    webservis que se utiliza para cargar archivos mp3 convirtiendolos en base64 y descomprimiendolo en el servidor de la nube .Se necesita validar que los archivos que estan en cola de subida ya se hayan subido correctamente esto con una validacion de tamaño de archivo comprar tamaño local y tamaño de la nube , luego actualizar el estado en la tabla. Mostrar mensaje al momento de carga de archivos ejemplo: SUBIENDO ARCHIVO - MOSTRAR LISTA DE ARCHIVOS QUE SE ESTAN SUBIENDO Programadores que sean de Perú , Mexico , Costa Rica , Venezuela

    $37 (Avg Bid)
    $37 Avg Bid
    14 bids

    I'm seeking a knowledgeable freelancer who can help decrypt files on a flash extractor with a CBM2099EA chips bank that only shows "NO NAME" on my Mac. Even though I can access these fil...extractor with a CBM2099EA chips bank that only shows "NO NAME" on my Mac. Even though I can access these files, they're encrypted and I need them decrypted for daily usage. Specifically, I need help with: - Determining why the flash extractor doesn't display a name - Decrypting the encrypted files for personal use The ideal freelancer for this task should have experience with macOS and data decryption. Understanding of encryption technologies, and previous experience dealing with similar hardware/software issues, will be greatly appreciated. Please bid if yo...

    $194 (Avg Bid)
    $194 Avg Bid
    5 bids

    I am in need of a specialist who can generate an RSA key with OAEP SHA1 padding. generate RSA key with a OAEP sha1 padding and fix error {"response_code":"36","response_description":"AES Decryption failed","error_details":"error:0607A082:digital envelope routines:EVP_CIPHER_CTX_set_key_length:invalid key length"}

    $210 (Avg Bid)
    $210 Avg Bid
    23 bids

    I am in urgent need of an expert who specializes in decrypting Excel files, specifically those created in Excel 2013 and above. Unfortunately, I have a file for which I never had the password. Important details for this task: - Expertise in Excel 2006 and above - Proficiency in password recovery or decryption methodologies - Capable of completing the task ASAP Prompt delivery is imperative. Please provide evidence of past similar projects completed when submitting your bid.

    $158 (Avg Bid)
    $158 Avg Bid
    26 bids

    I'm looking for a Node.js e...converted file should retain its original quality, with no adjustments to the resolution. - Mastery of Node.js - you should be proficient in creating scripts and have a deep understanding of the language - Previous experience in image processing - we're specifically looking to convert .raw image files into a .bmp format, so any experience in this particular area is a requisite - Knowledge of handling base64 strings in Node.js - we need someone who is comfortable working with this particular type of string Remember, we're not making any changes to the image's quality or resolution. The task's goal is purely conversion from one file type to another. Your proposal should detail your previous experience in this area, specifically...

    $23 (Avg Bid)
    $23 Avg Bid
    11 bids

    Hi, We are looking for someone that could add a feature to our custom customization tool on shopify. Currently, our system adds two canvases with the user customizations that overlay on the product picture. To capture the current engraving for visual reference, we convert the canvases to base64 code. Our goal now is to utilize the Cloudinary API to upload the current product picture and its corresponding base64 code of the customization, merge them and upload to Cloudinary. This process will generate a URL for the merged image, which will then be added as a product option to the cart. It's important to note that this operation should occur exclusively when the product is added to the cart, mitigating the need for frequent API usage. Any questions please ask. Thanks!

    $173 (Avg Bid)
    $173 Avg Bid
    60 bids

    Need a Node Js developer who work now itself and finish this in few hours, someone who knows about web socket and live stream please bid here. features: 1. Mock server should be having definitions of following API's /test, /test/eye, /test/face When a post request received from user, the response should be send in 5-6 seconds . Response...of following API's /test, /test/eye, /test/face When a post request received from user, the response should be send in 5-6 seconds . Response is a hard coded json. 2. Mock server should be having definition of /heartbeat and it immediatly send a response of 1 3. Once mock server receives /test, /test/eye, /test/face api call then it should also do a stream of .mp4 video through a websocket as base64 jpeg frames and ui should be able ...

    $12 (Avg Bid)
    $12 Avg Bid
    9 bids

    ...public key to GAP. Both parties should verify all requests will be signed with RSA-SHA256. The integration transmit formation is Json. And is encoded by UTF-8. The Operator generates a private/public key pair and sends the public key to GAP. Similarly GAP sends its public key to the Operator. The body of all requests will be signed with RSA-SHA256 using the respective private key and encoded to BASE64. The signature will be placed in the “Signature” header. The Operator needs to verify all Wallet API requests using the public key provided by GAP. GAP verifies all Games API requests using the public key provided by the Operator....

    $49 / hr (Avg Bid)
    $49 / hr Avg Bid
    43 bids

    Examsoft Decryptor Project Skills and Experience: - Expertise in decryption software - Proficiency in AES-256 encryption - Experience with Examsoft software - Knowledge of file formats, particularly PDF conversion Project Description: We are seeking a skilled freelancer with experience in decrypting Examsoft software files. The ideal candidate should possess expertise in AES-256 encryption and have prior experience working with Examsoft software. The main objective of this project is to decrypt an Examsoft file, specifically in PDF format. The decrypted file should retain its original formatting and content. Successful freelancers should include their experience in their application, showcasing past work and detailed project proposals. They should demonstrate their proficiency...

    $180 (Avg Bid)
    $180 Avg Bid
    17 bids

    Decryption of .js files for reverse engineering Skills and Experience: - Proficiency in JavaScript decryption - Experience in reverse engineering - Familiarity with debugging and accessing specific information in .js files Requirements: - Decrypting 6-10 .js files - Reverse engineering the code to gain insight and understanding - Debugging and accessing specific information within the decrypted .js files

    $430 (Avg Bid)
    $430 Avg Bid
    53 bids

    Existing nodejs code for crypto decryption stopped working, need to fix it

    $124 (Avg Bid)
    $124 Avg Bid
    1 bids

    ...Required: - Extensive experience in decrypting ransomware files, specifically [Specify the type of ransomware encrypted the files, if known] - In-depth knowledge of ransomware decryption techniques and tools - Proven track record of successfully decrypting ransomware files within tight deadlines - Familiarity with [Specify the type of ransomware encrypted the files, if known] and its encryption algorithms - Strong problem-solving skills and ability to think critically in order to find a suitable solution - Excellent communication skills to keep me updated throughout the decryption process Project Timeline: - The decryption process should be completed within 24 hours from the start of the project Deliverables: - All encrypted files should be successfully decrypted ...

    $137 (Avg Bid)
    Featured
    $137
    3 entries

    I am looking for a developer to create an API that will handle the encryption and decryption of payloads. Here are the details of the project: The following website () has an API which the website communicates with. This API works through encrypted content. The encryption logic is in the javascript; ```var r = function() { function e() { if (this.NUM_BITS = 128, this.NUM_ITERATIONS = 100, this.p_a_s_s_p_h_r_a_s_e = "X$_5g6p7@m5j708&Z", e._instance) throw new Error("Error: Classe nao pode ser instanciada dessa maneira: Use ()!"); this.s_a_l_t = ("4acfedc7dc72a9003a0dd721d7642bde")

    $217 (Avg Bid)
    $217 Avg Bid
    10 bids

    ...implementation. The ideal candidate should have a strong background in web security, particularly in implementing secure communication protocols and handling XML digital signatures. Key Responsibilities: Develop and maintain SOAP-based web services. Implement and manage XML digital signatures. Ensure secure data transmission using WS-Security standards. Manage SSL/TLS certificates and handle encryption/decryption processes. Debug and resolve any security issues related to SOAP web services and digital signatures. Optimize and ensure the efficiency and reliability of web services. Required Skills: Proven experience with SOAP web services and XML. Strong knowledge of digital signatures, WS-Security, SSL/TLS, and PKI. Proficiency in a programming language, preferably Python, for ...

    $252 (Avg Bid)
    $252 Avg Bid
    19 bids

    Dear developers. ...guide (how to use and build/deploy) is included in the proposal. One-off permission: Some social media platforms need one-off permission from users to post data to their pages (like FB, Twitter(X) …) so our project should ask people to allow permission to post data to their pages. Post method: - Input: JSON format - PlatformID: number (what social media platform to post data) - Image: array of base64 - Hashtags: array of string - Mentions: array of string Output: JSON format - IsSuccess: boolean - Error: (leave null if request success) - Code: number (error code) - Message: string (error description) Phase 2 will be integration for Instagram, LinkedIn and Tiktok. Please write 'Human' in your first proposal to ensure y...

    $239 (Avg Bid)
    $239 Avg Bid
    19 bids