Show Bid Request
Easy encryption program in assembly
Bid Request Id: 4676
|
Bookmark
|
Posted by: |
puck81 (2 ratings)
(Software buyer rating 10)
|
Posted: |
11/7/2001 7:57:28 PM EST
|
Bidding Closes: |
11/8/2001 10:15:00 PM EST
|
Viewed: |
138 times
|
|
|
|
Description:
Ok this is a lab assignment for my assembly class. Just a simple encryption program written in assembly ... I don't need anything too crazy, just that it works. Please only bid if you can do this if you can deliver this by 11 pm EST 11/8/01. I know this is short notice but it shouldn't take that long.
Deliverables: Introduction:
To protect the security of sensitive data during transmissions over data lines, encryption is applied to the original data at the sending location to produce a ciphered text to be transmitted. The ciphered text is a total transformation of the original text at the receiving end. The quality of an encryption methodology is generally measured by two criteria. First, the degree of protection it affords. The most effective encryption is the one that delivers a completely foolproof protection. However, theoretically a hundred percent encryption protection is not possible, for any human designs with the assistance of the power of computers can also be countered by other human designs with the assistance of the power of computers. The question is rather how much time and effort required to crack the encrypted codes. This leads to the second evaluative factor of an encryption methodology. The challenge is to identify a method that is most cost effective in providing the highest possible level of security protection.
The project:
You are asked to design an encryption method that is most cost effective considering the time and effort required to apply the encryption, and the time and effort it takes others to break it.
Procedure:
1. Write out the key(s) for encryption and decipher. 2. Run a test of your design on a string of test data. Use the test string as the original text, convert it into a ciphered text through your encryption method, and then retranslate it back to into the original text. 3.Use bit manipulation commands.
End products: 1. An explanation of your chosen encryption method. Explain why you believe it to be an excellent choice. 2. A copy of source code. 3. A copy of display of run test.
Special Conditions / Other:
As I stated before, I need this by 11 pm EST 11/8/01
Remember that contacting the other party outside of the site (by email, phone, etc.) on all business projects < $500 (before the buyer's money is escrowed) is a violation of both the software buyer and seller agreements.
We monitor all site activity for such violations and can instantly expel transgressers on the spot, so we thank you in advance for your cooperation.
If you notice a violation, you can report it to: abuse@rentacoder.com.
|
|
Bidding/Comments:
|
All monetary amounts on the site are in United States dollars.
Rent a Coder is a closed auction, so coders can only see their own bids and comments. Buyers can view every posting made on their bid requests. |
See all rejected bids (and all comments)
Name |
Bid Amount |
Date |
Coder Rating |
|
|
|
N/A
|
11/7/2001 9:38:21 PM EST
|
9.96
(Excellent)
|
|
|
If you let me to do this, I will map the characters to a random table of letters then multiply it by a constant then add it to a constant so it's no longer a letter. Then when decoding, I will do the reverse to get the string back. This is very fast and virtually impossible to cipher unless the hacker debugs the program. I will do this for $30.
|
|
|
|
|
|
Rent A Coder upholds the rigorous business practices required to be both a BBB member and Square Trade vendor.
- All customer issues addressed within 2 days
- Openly disclosed pricing and return policies
- Participation in mediation at buyer request
- Superior selling track record
This site is verified through it's parent company, Exhedra Solutions, Inc.
|
|
|
See all top coders...
What makes a top coder?
Created in partnership with:
|
|
In memory of the victims and the courageous rescuers of 9/11/2001
|
|