You will get help in modern cryptography and post quantum cryptography

You will get help in modern cryptography and post quantum cryptography

Project details
Cryptography:
Classic Cryptography
Modern cryptography
Post Quantum Cryptography
Post Quantum Cryptography:
Lattice-based cryptography
Multivariate cryptography
Hash-based cryptography
Code-based cryptography
Isogeny-based cryptography(Supersingular elliptic curve)
Cryptographic Algorithms:
1-Symmetric encryption algorithms include:
AES (Advanced Encryption Standard)
DES (Data Encryption Standard)
IDEA (International Data Encryption Algorithm)
Blowfish
Camellia
RC4 (Rivest Cipher 4)
RC5 (Rivest Cipher 5)
RC6 (Rivest Cipher 6)
2-Asymmtric Cryptography(Public-key cryptography):
Elliptic curve cryptography
RSA
Diffie-Hellman key exchange
DSA
3-Hash Functions:
MD4
MD5
SHA-1
SHA-2
SHA-3(keccak)
BLAKE2
BLAKE3
4-Zero-knowledge protocols:
The Feige-Fiat-Shamir Identification Scheme
5-Classic Cryptography:
Shift Cipher
Affine Cipher
Vigenere Cipher
Substitution Ciphers
One time Pad
CRYPTANALYSIS:
Differential Cryptanalysis
Algebraic Cryptanalysis
Languages:
VHDL
Verilog
C/C++
Python
Matlab
Classic Cryptography
Modern cryptography
Post Quantum Cryptography
Post Quantum Cryptography:
Lattice-based cryptography
Multivariate cryptography
Hash-based cryptography
Code-based cryptography
Isogeny-based cryptography(Supersingular elliptic curve)
Cryptographic Algorithms:
1-Symmetric encryption algorithms include:
AES (Advanced Encryption Standard)
DES (Data Encryption Standard)
IDEA (International Data Encryption Algorithm)
Blowfish
Camellia
RC4 (Rivest Cipher 4)
RC5 (Rivest Cipher 5)
RC6 (Rivest Cipher 6)
2-Asymmtric Cryptography(Public-key cryptography):
Elliptic curve cryptography
RSA
Diffie-Hellman key exchange
DSA
3-Hash Functions:
MD4
MD5
SHA-1
SHA-2
SHA-3(keccak)
BLAKE2
BLAKE3
4-Zero-knowledge protocols:
The Feige-Fiat-Shamir Identification Scheme
5-Classic Cryptography:
Shift Cipher
Affine Cipher
Vigenere Cipher
Substitution Ciphers
One time Pad
CRYPTANALYSIS:
Differential Cryptanalysis
Algebraic Cryptanalysis
Languages:
VHDL
Verilog
C/C++
Python
Matlab
What's included
Service Tiers |
Starter
$30
|
Standard
$60
|
Advanced
$100
|
---|---|---|---|
Delivery Time | 1 day | 3 days | 5 days |
Application Audit | - | - | - |
Project Plan | - | - | - |
Cost Estimation | - | - | - |
Frequently asked questions
About Salman
Electrical Engineer | Information Security
Islamabad, Pakistan - 8:20 am local time
,Computer Architecture,Cryptography,Electronic Circuit Design, Embedded Systems, Computer Security,Malware Analysis, Accelerated Hardware Architecture Designs(ASIC,FPGA)
SKILLS:
Verilog,VHDL,C++, C,x86 assembly, RISC-V assembly,MIPS assembly,ARM assembly, python automation, bash scripting, Keras, Tensorflow, Ghidra NSA reverse engineering suite, Linux CLI, Burp Suite, Wireshark,OSINT,Shodan
Hardware:
Arm Cortex M-4,Altera DE2 FPGA
Projects:
1-MIRCOPROCESSOR DESIGN COURSE
RISC-V PIPELINED PROCESSOR IN VERILOG.
The Project is done in Embedded system design course for design of 5- stage pipelined RISC-V processor in Verilog supporting all formats of 32IM of RISC-V ISA.
2-EMBEDDED SYSTEM DESIGN COURSE
POST-QUANTUM CRYPTOGRAPHY ON ARM-CORTEX-M4
The project is done in Embedded system design course for implementation of POST- QUANTUM Cryptography schemes focusing on lattice based algorithms on ARM cortex m4 in C and they are bench-marked against each other in terms of memory size, speed and stack size.
3-CRYPTOGRAPHY PROJECT
The goal of this project is to design accelerated pipelined Hardware Architecture Designs for Cryptography. In 1st phase of Project, most famous cryptographic algorithms including AES, SHA-3, ECDH and RSA are to be programmed in c and python and in 2nd phase their pipelined architectures are to be designed in Verilog.
4-ELECTRONIC CIRCUIT DESIGN COURSE
IOT BASED HOME AUTOMATION
The project is done in Electronic Circuit Design Course for IOT based home automation system Using NODEMCU for sensing of more than 4 sensors and control of lights, fans, etc. through web based AdaFruit server and google voice assistant commands.
5-MOBILE COMMUNICATION COURSE
SURVEY ON WIRELESS SECURITY
In the course of Mobile Communication, Our group surveyed by reading research papers and gave presentation on wireless and mobile communication security covering from 1G to 5G security vulnerabilities.
6-PERSON RE-IDENTIFICATION USING MULTIPLE CAMERAS.
Our project "Person Re-Identification using Multiple Cameras" is an intelligent video
surveillance system capable of finding a person as he or she moves across a network of CCTV cameras Using Deep Learning.
Steps for completing your project
After purchasing the project, send requirements so Salman can start the project.
Delivery time starts when Salman receives requirements from you.
Salman works on your project following the steps below.
Revisions may occur after the delivery date.
Gather Information
I need information about the cryptography work in the form of document or text.
Delvery of Cryptography work
I would deliver Cryptography work.