Program to encrypt messages using the caesar cypher

Assignment Help Computer Network Security
Reference no: EM13693779

Can you provide the answer of this question?

Question: The field of cryptography concerns methods for per-forming encryption, which takes a message, called the plaintext, and converts it into a scrambled message, called the ciphertext.

The reverse process of decryption takes the ciphertext and converts it back into the plaintext.

One of the earliest encryption schemes is the Caesar cipher, named after Julius Caesar, who used it to protect military communications.

The Caesar cipher works by replacing each letter in the plaintext with the letter that comes three letters after it in the alphabet for that language. In English, each 'A' would be replaced with 'D', each 'B' with 'E', and so on up to 'W', which is replaced by 'Z'.

Then we "wrap around", replacing 'X' with 'A', 'Y' with 'B', and 'Z' with 'C'. These rules apply for lower case letters as well.

Punctuation and spaces are not changed. Write a program to encrypt messages using the Caesar cypher. The input is a single line containing letters of either case, punctuation, and spaces.

The output is a single line containing the ciphertext. For example, if the input is Attack at dawn! then the output should be Dwwdfn dw gdzq!

Can you answer this problem using basic computer networking concepts and securities.

I'm not sure how to solve the question. Can anyone help me?

Reference no: EM13693779

Questions Cloud

Explain why bits are not real as if you were nyquist : Explain why bits are not real as if you were Nyquist. Then Using Nyquist formula explains how to create this bits abstraction? Can you answer this question? Provide answer with example.
Explain how many kilograms of h2so4 are present : Problem- If the pH of a 1.5-in. rainfall over 1600mi2 is 3.1, how many kilograms of H2SO4 are present, assuming that it is the only acid contributing to the pH?
Program that tests if an input string is a palindrome : Write a recursive method that takes a string as argument and returns the reverse of the string (given the argument "Horse" your method should return the string "esroH").
Identify which halogen is in which bottle : Problem- You are given Br2 water and I2 water however the bottles are not labeled. The color of both solutions is similar. What reaction would you perform to identify which halogen is in which bottle
Program to encrypt messages using the caesar cypher : The field of cryptography concerns methods for per-forming encryption, which takes a message, called the plaintext, and converts it into a scrambled message, called the ciphertext
How many millimoles of acetate need to add to the solution : Problem- You need to produce a buffer solution that has a pH of 5.44. You already have a solution that contains 10. mmol (millimoles) of acetic acid. How many millimoles of acetate (the conjugate base of acetic acid) will you need to add to this s..
Moles of water, copper and sulfate were in the compound : The sample lost 0.506g of mass. After reacting with aluminum wire, 0.595g of copper was recovered. How many moles of water, copper and sulfate were in the compound. What is the mole ratio of these 3 components
Process of buying a soda from a soda machine : Please write a Java Program those steps through the process of buying a soda from a Soda Machine.  You must interact with the consumer. Each Soda is one dollar.
Propose a three-step synthesis of hexanal : Problem- Begining with sodium acetylide (NaCCH), propose a three-step synthesis of hexanal.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Controls to detect or prevent salami attacks

List three controls that could be applied to detect or prevent salami attacks. Modularity can have a negative as well as a positive effect. A program that is overmodularized performs its operations in very small modules.

  Define cybercrimes and computer security

Evaluate how teamwork and leadership are effective tools for financial forensic investigations. Provide support for your evaluation.

  Explain cross-talk and other forms of interference

Cross-talk, and other forms of interference are a significant issue in any communications infrastructure. Compare and contrast how this problem would manifest for analog data transmitted

  Choose two firms which offer computer security outsourcing

you have been asked to help decide whether to outsource security or keep the security function within the firm. search

  Make a 3-4-page memo outlining what you have done as the

over the past several years the chief executive officer ceo of your company has read articles on internet control

  What is computer security

Computer security is integral part of any organization, if any organization hasstarted working in, immediately it should start Computer security for its systemif they want to protect their system for future.

  What is the ciphertext generated by encryption of character

What is the ciphertext (in binary form) generated by the encryption of character D? How is plaintext for this encrypted D recovered?

  What was the digital crime and who was the subject or what

select a real world event related to digital forensics. this could be a crime a well documented breach or intrusion or

  Construct a secure mac scheme by using prf

Prove the security of the MAC scheme you constructed in the previous item. In order to get the full bonus points, you are expected to provide a rigorous security proof and construct a secure MAC scheme by using PRF.

  Decrypt cipher-text by using secret key

Decrypt the cipher-text c = 12 by using secret key sk = (p, q) = (11, 13), where te corresponding public key is pk = (N, e) = (143, 13).

  Explaining ethical issues and the abuse of privacy

Search the Internet for good examples of cases that involve ethical issues and the abuse of privacy. Provide a review and analysis of your findings.

  Is internet pose threats to traditional client server system

Hures is a leading human resource service provider. To keep up with growing business demands,it implemented its first information system in 1987 purchasing a main frame computer that servedso-called dumb terminals on the users' desktops.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd