Foto de portada de perfil
Ahora estás siguiendo a
Error al seguir a usuario.
Este usuario no permite que los usuarios lo sigan.
Ya estás siguiendo a este usuario.
Tu plan de membresía solo permite 0 seguimientos. Mejora tu membresía aquí.
Dejaste de seguir correctamente a
Error al dejar de seguir al usuario.
Has recomendado exitosamente a
Error al recomendar al usuario.
Algo salió mal. Por favor, actualiza la página e intenta de nuevo.
Email verificado correctamente.
Avatar del usuario

Harshit V.

@harshit1618

0,0
0
0,0
0,0
0%

System security expert

$4 USD / hora
Bandera de
India (5:27 p. m.)
Se unió el agosto 23, 2024
$4 USD / hora
I am excited to submit my proposal for developing the security software programs you've outlined. With extensive experience in Python, Java, and C#, and a strong background in cybersecurity, I am well-equipped to deliver robust, secure, and efficient solutions tailored to your specific needs. Project Deliverables I will develop the following software programs, each corresponding to the specified lab exercises: Lab 1: Symmetric Ciphers DES (Data Encryption Standard) Implementation Develop a program that encrypts and decrypts data using DES. Include a user interface for easy key input and ciphertext generation. AES (Advanced Encryption Standard) Implementation Create an application that performs AES encryption and decryption. Support different key sizes (128-bit, 192-bit, 256-bit). Lab 2: Key Exchange Algorithm Keys and X.509 Certificate Management Implement a system to generate and manage X.509 certificates. Provide tools for key generation and certificate signing. Diffie-Hellman Key Exchange Develop a program to demonstrate the Diffie-Hellman key exchange process. Include functionality to securely share keys between two parties. RSA Key Exchange Create a secure RSA key exchange system. Support key generation, encryption, and decryption. Lab 3: Hash Function SHA1 and SHA2 Hash Function Implementation Implement programs that generate SHA1 and SHA2 hashes. Demonstrate the use of hash functions for data integrity and authentication. Usage of Hash Function Provide examples of how hash functions can be used in digital signatures and data verification. Lab 4: Network Security Protocols Kerberos on Windows Set up and demonstrate Kerberos authentication on a Windows environment. Develop a client-server application that uses Kerberos for secure communication. Skills and Technologies Programming Languages: Python, Java, C# Security Expertise: Internet Security, Encryption, Network Security Technologies: DES, AES, X.509 Certificates, Diffie-Hellman, RSA, SHA1, SHA2, Kerberos Timeline The project will be completed within 6 days, with daily updates and deliverables to ensure the project meets your expectations. Why Choose Me? Expertise: I have a deep understanding of encryption, key exchange algorithms, and network security protocols. Quality Assurance: I ensure that all software is thoroughly tested and meets the highest standards of security and performance. Client Satisfaction: I am committed to delivering solutions that exceed your expectations, with clear communication and support throughout the project. I look forward to the opportunity to work on this project and deliver high-quality software solutions that meet your needs. Thank you for considering my proposal. Let’s secure your systems together!
Cambios guardados
0.0 · 0 Reviews
Opiniones
¡No hay comentarios para ver aquí!
Experiencia
system security Analysts
ago, 2024 - Presente
5 meses
securemeters pvt ltd
ago, 2024 - Presente
5 meses
At my current organization I work as a System Security Analyst specializing in securing IoT devices and smart meters. My responsibilities include conducting vulnerability assessments using tools like Nessus and Nmap, testing protocols such as Zigbee and CoAP, and evaluating device hardening measures also focus on WAN interface testing, malware detection using machine learning, and ensuring compliance with security standards to safeguard critical infrastructure.
Bandera de
Udaipur , India
ago, 2024 - Presente
5 meses
Educación
Master of Technology
2023 - 2024
1 año
Bandera de
India
2023 - 2024
1 año
Verificaciones
¡Invitación enviada correctamente!
¡Gracias! Te hemos enviado un enlace para reclamar tu crédito gratuito.
Algo salió mal al enviar tu correo electrónico. Por favor, intenta de nuevo.

Usuarios registrados

Total de empleos publicados

Freelancer ® is a registered Trademark of Freelancer Technology Pty Limited (ACN 142 189 759)

Copyright © 2025 Freelancer Technology Pty Limited (ACN 142 189 759)

Cargando visualización previa
Permiso concedido para Geolocalización.
Tu sesión de acceso ha expirado y has sido desconectado. Por favor, inica sesión nuevamente.