In Cryptography, to analyse the strength of certain cryptography functions, it is customary to consider a hypothetical 'oracle' which may perform certain tasks when queried. Such oracle is assumed to have its procession certain secrets, such as the encryption/decryption key, and the task of the attack can be to figure one or more secrets, or forge certain messages (MAC or digital signatures) by interacting with the oracle. For example, an 'encryption oracle' may produce a cipertext that corresponds to the plain text supplied by the attacker but would not disclose the secret key it uses to encrypt the plain text. In such scenario, one could ask whether, given enough plaintext-ciphertext, pairs, the attacker could figure out the secret key or not. The following two problems will assume certain oracles that can perform certain tasks when queried, and the goal of the attacker is to guess certain secrets possessed by the oracle (Problem 1), or forge a message authentication code that can pass the test by Oracle.
Important note is the solution must not depend on the knowledge of the provided fixed values for key k and secret s as these two values are assumed that they can change.
Dear Sir,
I read your job in www.freelancer.com and my skills match with your job very much. So that i am interested to apply your job.
And i wish to serve you if you give me the opportunity.
I have 4 years of experience in the following area
HTML/HTML5
CSS/CSS3
JavaScript
jQuery
Ajax
Web Design
PSD to HTML
Java
Java Spring Framework
JDBC
JSP
Servlet
MySql
Oracle
JasperReports
I am an IITK graduate and I have 9 years of experience in software development. I have 100% completion rate and I have finished all the projects with the highest level of customer satisfaction. I usually finish projects with ease on which other freelancers have already given up. I learn and understand new stuff very fast and finish the job with top quality and reliability.
I have MS in Information Security with research interest of Cryptography.
I have implemented Cryptography algorithms in Java and C, written security solutions in J2EE and Java, have implemented datastructures in Java, and built two websites for research / proof-of-concept purposes. Additionally, ~6 years of full time Software Development experience.
I have taken Graduate level courses in Cryptography and Security that dealt with analysis of Cryptographic protocols, my Masters level project involved design of a Cryptographic protocol for a specific authentication problem in three-party settings.
Notable projects completed include implementation of cryptography Algorithms for Standard Transfer Specification(STS), Design and Implementation of Android App and Backend for Medical Records Storage Service (this service stored all data encrypted in Databases), development for application for signing XML documents using XaDES standard.
Details about projects executed available on request.
You might want to go through reviews project creators left for me on freelancer.com, see https://www.freelancer.com/u/ciphe.html.
I have read Project Description but really need more detailed requirements or at least high level features to estimate it precisely, because based on the project description, I can't estimate.
Please contact me for portfolio or further discussion about your project, also, my current bid is just a placeholder.
Look forward to hearing from you.
Bid Summary
Sir,
I have an RSA implementation in Java Eclipse I can send you.
Your theory is directly dependent of the encryption algorithm used.
Regards.
Relevant Experience
RSA encryption project: https://www.freelancer.com/projects/Anything-Goes/Implementation-Brute-Force-analysis-for/