Encrypt and decrypt messages

Assignment Help Basic Computer Science
Reference no: EM13317009

Goal

You will write a program in C, in the Ubuntu Linux environment, to provide the end user with the ability to encrypt and decrypt messages, using a secret key. Your program will prompt the user to indicate whether they wish to encrypt a readable ("plaintext") message or decrypt an already encrypted sequence of numbers ("ciphertext") back to its readable form. You will implement the encryption and decryption algorithm described in the instructions below. In order to prevent your enemies from easily cracking your encrypted messages, the algorithm will use an incrementing counter to encrypt each character in a slightly different way. Your program will output the result (either the ciphertext or the plaintext) to the screen. You will begin with the skeleton code found here.

Learning Objectives

• familiarize yourself with the Linux programming environment
• write a small program in C that is modular, correctly designed and documented
• manipulate values at the bit level

Reference no: EM13317009

Questions Cloud

How long does doug have to open door before fatality limit : Doug decides to use a turkey fryer to prepare the Thanksgiving turkey. Due to cold weather, he prepares the turkey with the door closed, limiting air exchage (Q) within the 40 m3 garage to 0.2 m3 min-1
Projected total unit workload-patient classification level : Based on susan's projection of patient days, what is the projected total unit workload by patient classification level? What differences do you notice between the projected and the historic total unit workload?
Explain why should find another spot to camp : Based upon the recommended level for CO of 40 mg/m3, the given conditions, AND the fact that the fire will be burning ALL night, should you find another spot to camp b.
Determine the diameter of the hole : A large storage tank, open at the top and filled with water, develops a small hole in its side at a point 16.4 m below the water level. Determine the diameter of the hole
Encrypt and decrypt messages : Write a program in C, in the Ubuntu Linux environment, to provide the end user with the ability to encrypt and decrypt messages, using a secret key
Determine the radius of the circle : Three point charges, -6.05 10-9 C, -9.75 10-9 C, and +7.50 10-9 C, are fixed at different positions on a circle. What is the radius of the circle
Students for fair tuition-down with fascist tuition increase : Members of Students for Fair Tuition (SFT) decide to protest rising tuition costs at Gigantic State University (GSU) by taking over Dunfee Hall, the location of GSU president Dalton Chandler’s office. As they storm into the reception area of Chandler..
Determine the magnitude of the z component of the reaction : The geometry of the rod assembly is given as a=2.8 m, b=0.950 m, c=1.00 m, and d=0.600 m. Neglect the weight of the rod. The journal bearing supports the rod in such a manner that it is free to rotate in the Z-direction.
Calculate the electron speed : In a television picture tube, electrons strike the screen after being accelerated from rest through a potential difference of 33 500 V. find the electron speed just before the electron strikes the screen

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Approach appropriate for company forefront of technology

However, adopting a secondary approach where others adopt early and a firm learns from their mistakes is often a viable strategy. When is each approach most appropriate and why?

  Create cron file which will regularly perform backup

Create a cron file that will regularly perform the following back ups: performs a level 0 backup once per month and performs a level 2 dump one day per week

  Write a program that asks the user to enter a string

Write a program that asks the user to enter a string. Create a pointer called strPtr and print the first character, third character and fifth character from your string using this pointer.

  Calculate the sum of all the elements of firstarray

Calculate the sum of all the elements of FirstArray and put the sum in EAX. Use indirect addressing to access the elements of array.

  Design a step by step algorithm

Design a step by step algorithm, keeping in mind the limitations of assembly language, to determine the physical address of the 3rd byte of the data segment variable LIST in the following code example.

  Explain remote batch-processing operation

A band is always equal to? In signal power as light travels down fiber is called. what does remote batch-processing operation in which data is only input to central computer would need?

  Make sure the formatted string contains only 2 digits

Make sure the formatted string contains only 2 digits following the decimal point. Store the formatted string into a String variable called str.

  Linear programming model to be formulated and used

What are the assumptions for a linear programming model to be formulated and used?

  Design concept in terms of the usability of the design

A justification for the design concept in terms of the usability of the design. You should explain why your decisions make sense and why your interface concept works for the application. Any preliminary designs can be included as an Appendix to th..

  Support desktop computers in small company

Static IP address of server is 192.168.45.200. Employees will open their Web browser and enter personnel.mycompany.com in URL address box to browse Web site.

  Design a stop-and-wait-like error control protocol

Design a stop-and-wait-like error control protocol for reliably transferring a packet from A to B and C such that A will not accept the next payload from the upper layer until both B and C have correctly received the current payload. Describe the ..

  What are the overall benefits of having professional codes

What are the overall benefits of having professional codes? Do the benefits outweigh the disadvantages of not having them? Find a current case involving ethical standards.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd