Program to encrypt messages using the caesar cypher

Assignment Help Computer Network Security
Reference no: EM13693779

Can you provide the answer of this question?

Question: The field of cryptography concerns methods for per-forming encryption, which takes a message, called the plaintext, and converts it into a scrambled message, called the ciphertext.

The reverse process of decryption takes the ciphertext and converts it back into the plaintext.

One of the earliest encryption schemes is the Caesar cipher, named after Julius Caesar, who used it to protect military communications.

The Caesar cipher works by replacing each letter in the plaintext with the letter that comes three letters after it in the alphabet for that language. In English, each 'A' would be replaced with 'D', each 'B' with 'E', and so on up to 'W', which is replaced by 'Z'.

Then we "wrap around", replacing 'X' with 'A', 'Y' with 'B', and 'Z' with 'C'. These rules apply for lower case letters as well.

Punctuation and spaces are not changed. Write a program to encrypt messages using the Caesar cypher. The input is a single line containing letters of either case, punctuation, and spaces.

The output is a single line containing the ciphertext. For example, if the input is Attack at dawn! then the output should be Dwwdfn dw gdzq!

Can you answer this problem using basic computer networking concepts and securities.

I'm not sure how to solve the question. Can anyone help me?

Reference no: EM13693779

Questions Cloud

Explain why bits are not real as if you were nyquist : Explain why bits are not real as if you were Nyquist. Then Using Nyquist formula explains how to create this bits abstraction? Can you answer this question? Provide answer with example.
Explain how many kilograms of h2so4 are present : Problem- If the pH of a 1.5-in. rainfall over 1600mi2 is 3.1, how many kilograms of H2SO4 are present, assuming that it is the only acid contributing to the pH?
Program that tests if an input string is a palindrome : Write a recursive method that takes a string as argument and returns the reverse of the string (given the argument "Horse" your method should return the string "esroH").
Identify which halogen is in which bottle : Problem- You are given Br2 water and I2 water however the bottles are not labeled. The color of both solutions is similar. What reaction would you perform to identify which halogen is in which bottle
Program to encrypt messages using the caesar cypher : The field of cryptography concerns methods for per-forming encryption, which takes a message, called the plaintext, and converts it into a scrambled message, called the ciphertext
How many millimoles of acetate need to add to the solution : Problem- You need to produce a buffer solution that has a pH of 5.44. You already have a solution that contains 10. mmol (millimoles) of acetic acid. How many millimoles of acetate (the conjugate base of acetic acid) will you need to add to this s..
Moles of water, copper and sulfate were in the compound : The sample lost 0.506g of mass. After reacting with aluminum wire, 0.595g of copper was recovered. How many moles of water, copper and sulfate were in the compound. What is the mole ratio of these 3 components
Process of buying a soda from a soda machine : Please write a Java Program those steps through the process of buying a soda from a Soda Machine.  You must interact with the consumer. Each Soda is one dollar.
Propose a three-step synthesis of hexanal : Problem- Begining with sodium acetylide (NaCCH), propose a three-step synthesis of hexanal.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Mobile wireless networks

3G Safekeeping model, safekeeping architecture standards ITU-T X.805 and ISO/IEC 18028-2, access points (AP), network admission controller (NAC) and authentication server (AS)

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Discuss briefly the use of inheritance blocking and forcing

You are required to show evidence that you can prevent student phone numbers on the user information from being read by anyone other than Dorothy Liddleton and the appropriate section manager.

  Write application-layer protocols use to move message

Explain how message gets from Alice's host to Bob's host. Make sure to list series of application-layer protocols which are used to move message between the two hosts.

  Design the layout of users

The topology diagram for the different servers and locations and trust domains. For example, where is the firewalls, and where are the users located in the topology.

  Recognize the various ways that agency or organization

cyber security power point presentation using the information you learned from modules 1 and 2 create a powerpoint

  What is virtualization

What is virtualization and what are the benefits and tradeoffs and explain at least three common virtual technologies that are used.

  There is a broad range of cybersecurity initiatives which

question there is a wide range of cybersecurity initiatives that exist on the international level. from a u.s.

  Relationship between technical or it staff

Determine what your relationship would be like with the technical or IT staff at your corporation if you were working side by side on a project or training exercise?

  What firewall type or methodology or system would you

what firewall typemethodology or system would you recommend for a small 10-user it shop running windows systems

  Common information security concepts at the apprentice level

Write about common information security concepts at the apprentice level. Your summary must include an analysis that addresses strategic fit

  Create a 7-10 slide presentation on information systems

create a 7-10 slide presentation on information systems security and it infrastructure. you may use various sources

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd