# Software cryptanalysis jobs

need someone who is good in cryptography and **cryptanalysis** as well as in matlab and maple. have to implement "differential-linear attack" on dummy structure of 4 or 8 bit cipher in matlab or maple. at the end i need a brief report and source code with comments. you have to do everything by yourself.

The requirement is to decipher a cryptogram message to plaintext. All details will be sent to interested parties if you want to know more. This project is recommended for cyber security or information security experts. No programming involve. Just explain how you did it.

I want to implement the proposed cryptanalytic algorithm utilizing the NTL library (The Number Theory Library) to get same or approximately results.

...new references (journals). The references should be related to Braids NP-hard problem, Braid Conjugacy problem and some papers which clearly support our claims that no **cryptanalysis** attacks on Braid Conjugacy problems.
Please also note that it is not important to find paper that directly talk about braids in hash functions, but It is very good to

I have proposed a Simplifi...experimentally and compared against multiple cipher. I wish to extend the analysis by providing additional analysis based using the following techniques.
- Differential and linear **cryptanalysis**
- Algebraic attacks
- Key schedule attacks
- Etc ..
This will include writing the text that describe each in details.

I have proposed a Simplifi...experimentally and compared against multiple cipher. I wish to extend the analysis by providing additional analysis based using the following techniques.
- Differential and linear **cryptanalysis**
- Algebraic attacks
- Key schedule attacks
- Etc ..
This will include writing the text that describe each in details.

Differential and linear **cryptanalysis**
Algebraic attacks
Key schedule attacks
i want this analysis conducted

I have proposed a Simplifi...experimentally and compared against multiple cipher. I wish to extend the analysis by providing additional analysis based using the following techniques.
- Differential and linear **cryptanalysis**
- Algebraic attacks
- Key schedule attacks
- Etc ..
This will include writing the text that describe each in details.

...resilient against the following attacks:
01. brute-force
02. differential **cryptanalysis**
03. linear **cryptanalysis**
04. differential-linear **cryptanalysis**
05. truncated differentials
06. higher-order differentials
07. interpolation attack
08. davies attack
09. related-key **cryptanalysis**
10. algebraic attack
11. side channel attack
12. and other attacks

Hello,
I want you to teach me as much as possible about **cryptanalysis** technique.
Thank you.

i have a questionnaire of 10 questions regarding **cryptanalysis** and it security i want them be be answered its like a quiz For Computer Science graduate.1 USD for 1 Question.

A text is to be decrypted using Vigenere **Cryptanalysis**

the project is the implementation of particle swarm optimization technique for **cryptanalysis**.....where the input is the text encrypted through aes algorithm and the letter frequencies of various english letters (bigram/trigram) to obtain the key by which the plain text is encrypted....and the same process with genetic algorithm
The implementation

the project is the implementation of particle swarm optimization technique for **cryptanalysis**.....where the input is the text encrypted through aes algorithm and the letter frequencies of various english letters (bigram/trigram) to obtain the key by which the plain text is encrypted....
The implementation of pso algorithm is required in this project

This **cryptanalysis** assignment consists of a **software** implementation of an algorithm that tries to decrypt an L-symbol challenge ciphertext computed using a permutation cipher. Informally speaking, your program's goal is to find the plaintext used to compute this ciphertext within a reasonable amount of time. Specifically, your program should print on

Hello,
I want you to teach me how exactly implement each of the **cryptanalysis** method.
Happy bid!

Multidimensional zero-correlation linear
**cryptanalysis** of the block cipher KASUMI
More details will be shared at the time of discussion..

Multidimensional zero-correlation linear
**cryptanalysis** of the block cipher KASUMI
More details will be shared at the time of discussion..

Multidimensional zero-correlation linear
**cryptanalysis** of the block cipher KASUMI
More details will be shared at the time of discussion....

Hello, I want to teach me all of the cryptanalyst method that can be used to break a chiper. Thank you.

it is a project based on neural cryptography... simulation of basic part can be find at: [login to view URL]
and...tography
and also in the pdf attached.
Its about the generation of key through synchronization of neural networks and encryption and decryption through AES. And the **cryptanalysis** of AES through PSO algorithm.

Breaking a simple 128 bit authentication algorithm of an embedded device. The host sends message X: 128 bit to the device, device respon...thus simple (takes few microseconds to compute on an embedded microcontroller). We need to find the algorithm f(). We can pass any sequence of data X to produce Y for **cryptanalysis** methods. An example is attached.

...within a reasonable amount of time. Specifically, your program should print on screen something like "Enter the ciphertext:", obtain the ciphertext from stdin, apply some **cryptanalysis** strategy and output on screen something like "My plaintext guess is:" followed by the plaintext found by your strategy. In doing that, your program is allowed access to:

...within a reasonable amount of time. Specifically, your program should print on screen something like "Enter the ciphertext:", obtain the ciphertext from stdin, apply some **cryptanalysis** strategy and output on screen something like "My plaintext guess is:" followed by the plaintext found by your strategy. In doing that, your program is allowed access to:

I need you to develop some **software** for me. I would like this **software** to be developed for Windows using Java.I need a **software** on **cryptanalysis** of Vigenere cipher. please only those with excellent idea in this topic and java should bid, I will also be needing the class diagram and UML diagram
for this **software**

This is a school assignment has to be done on or before 24 May 2015. This has to implement DES (Data Encryption Standard) in PHP language. This has Two sections as below, Section 01 - A programme to implement the Caesar Cipher (Encryption & Decryption) [For this section, any page of a e-book is needed according to the instruction in the attached document called "[login to view URL...

...for the project. The important parts are the Aim, Functional, non functional and usability requirement.
Encryption and Decryption are working fine
I need help with **cryptanalysis**
The Kasiski method (done but not accurate, needs to be checked)
Index of coincidence (done but not accurate, needs to be checked)
Frequency analysis (not done yet, need

We need to check our random number generator in order to find any loopholes. **Cryptanalysis** and algorithm basics required!
More info will be provided individually.

Linear or differential **cryptanalysis** of DES.
3-DES will be preferred.
The project should be done using MATLAB or C-language.
Final project will be given to the freelancer who will submit implementation of efficiently written code for an 8 or 16-bit block cipher.
This could be taken as a first stage of a major project, which would be worth a lot

**Cryptanalysis** Lab.
Write 2 pages answering 3 questions
and unscramble, scrambled words.
More details in the attached pdf.

I need to write program within 24 hours. Will send complete details to bidders.
Brute Force
Th...However, while this cipher may fool some people who don't understand cryptography, it won't keep a message secret from someone who knows **cryptanalysis**. While cryptography is the science of making codes, **cryptanalysis** is the science of breaking codes.

Classical Symmetric Ciphers
Implement a...Compare the algorithms based on time complexity (encryption and decryption
times), throughput (total plaintext in bytes encrypted/encryption time), space
complexity, **cryptanalysis** etc.
Comparison can also be done based on different file sizes, different key
sizes, different types of data etc.

Please read the attachment and get back to me as soon as possible. need to do question 3, 5, 6 and 7 Deadline 19/03/2014 11AM UK TIME!

Please read the attachment and get back to me as soon as possible. need to do question 3, 5, 6 and 7 Deadline 19/03/2014 11AM UK TIME!

Please read the attachment and get back to me as soon as possible. need to do question 3, 5, 6 and 7 Deadline 19/03/2014 11AM UK TIME!

The aim of this assignment is to perform a linear **cryptanalysis** of the FEAL-4 block cipher as presented in the lectures.
You can find a copy of the source code for this cipher (attached here)from which the secret key has been removed, but which also prints out the intermediate values of the cipher.
An executable version of this code which has the

keypress of 9 digit keypad by sound recognize and translate to numbers, i dont know how to put in words what i need but i will try, i have a device this can be an android app here are some links that are a little bit like my idea but much harder. [login to view URL] . [login to view URL] i take the device i press learning mode i press number 1 of metal keypad the device microphone analyze s...

The aim of this assignment is to perform a linear **cryptanalysis** of the FEAL-4 block cipher as presented in the lectures.
You can find a copy of the source code for this cipher (attached here)from which the secret key has been removed, but which also prints out the intermediate values of the cipher.
An executable version of this code which has the

...ciphers. It
is expected that you will make use of the CrypTool package to perform the experiments.
Although no other tools should be necessary, you are free to use any other **software** or to
write your own.
For each experiment, describe clearly what outputs you found and explain why you think
these results occurred using the theory that we have studied

we want the code for the **cryptanalysis** on Data Encryption Standard .the code should be in matlab .the method used for the DES is s-block method ,now we want to **cryptanalysis** on that encryption [login to view URL] crypt analysis should be any method(either linear crypt analysis or differential **cryptanalysis**)

Hi bidders, I need test a security of a text. You must be a smart person for this project, time is not important. 1. You post your bid. (attention your bid is for the process and not for the final decrypted text) 2. I send a test (1-5 words) 3. You send me the text after decryption 4. If is logic I send the full text for analysis, is not a logic word or sentence you can try again 5. Whe...

The main aim of this project is to design a **software** tool that can perform automatic **Cryptanalysis** on Classical ciphers. In the context of this project, there's the Caesar's cipher and the Vigenere Cipher. Any transposition cipher is optional.
The tool should implement techniques like Brute-Force, Frequency Analysis and Kasiski Examination(For Vigenere

...such as encryption), documentation of code (heavy comments), and support for foreign-language translations.
**1.1 Purpose -** The purpose for developing this open-source **software** is to preserve the free, uncensored flow of information by providing a tool that guarantees survivable, last-chance communication in the event a user is denied access to standard

...such as encryption), documentation of code (heavy comments), and support for foreign-language translations.
**1.1 Purpose** ??" The purpose for developing this open-source **software** is to preserve the free, uncensored flow of information by providing a tool that guarantees survivable, last-chance communication in the event a user is denied access to standard

...such as encryption), documentation of code (heavy comments), and support for foreign-language translations.
**1.1 Purpose** ??" The purpose for developing this open-source **software** is to preserve the free, uncensored flow of information by providing a tool that guarantees survivable, last-chance communication in the event a user is denied access to standard

...Should be able to decode multiple pages at one time and save out put.
deZender is the **software** that specially used for to decompile/decode PHP files encoded by Zend Encoder/SafeGuard, ionCube, SourceGuardian, phpcipher, codelock or SourceCop. It mainly use **cryptanalysis**, decompressing and decompiling technology to decode an encoded PHP file into readable

...be installed by the Seller in ready-to-run condition in the Buyer's environment.
b) For all others including desktop **software** or **software** the buyer intends to distribute: A **software** installation package that will install the **software** in ready-to-run condition on the platform(s) specified in this bid request.
3) All deliverables will be considered

I'm looking for a developer to create an online game to teach cryptography history, **cryptanalysis**, as well as teach the players about modern ciphers, and cryptographic applications. I’d really like this game to take a person with a little or no cryptographic experience and by the completion of the games give them a solid foundation in cryptology without

I'm looking for a developer to create an online game to teach cryptography history, **cryptanalysis**, as well as teach the players about modern ciphers, and cryptographic applications. I'd really like it if the developer would break this up into 3 or 4 different games, but I'll leave it up to the developer’s judgment. I’d really like this game to take