The main program should create an ifstream

Assignment Help C/C++ Programming
Reference no: EM13165513

The focus of this lab is on using strings. You will have an opportunity to work with both C style strings and the string data type. This lab also gives you an opportunity to use what you have learned previously, including using functions, array processing, repetition, and selection. You will also have an opportunity to work with file input and output.

You are to design and implement a program which does encryption and decryption of data from files. Encryption is the process of taking plain lines of text and performing some algorithmic transformation on the data to create an encrypted line of text which looks nothing like the original. Decryption is the process of taking an encrypted line of text and performing some algorithmic transformation on the data to recover the original line of plain text.

Encryption and Decryption Approach

Our approach to encryption and decryption involves two strings. The first is an encryption / decryption string which we will allow to be up to 128 lower case alphabetical characters in length. The second string is a line of text from a file that is to be encrypted or decrypted.

Our basic strategy for encrypting data is based on mapping alphabetical characters to specific values, then doing some simple mathematical operations to create a new value. First of all, every character in either the encryption string or the input string is mapped to a number between 0 and 25 based on its position in the alphabet.

            A = a = 0
            B = b = 1
            Z = z = 25

The mapped value of a character is easily obtained by doing the following:

For lower case characters, subtract 'a' from the character.
For upper case characters, subtract 'A' from the character.

To calculate the modified value of the first character of input we add its mapped value to the mapped value from the first character of the encryption string. This modified value is then adjusted using % 26 to make sure that the final modified value is within the 0 - 25 range. To create the final encrypted character value for the first character, simply do the following:

For lower case characters, add 'a' to the modified value.
For upper case characters, add 'A' to the modified value.

This is done for each alphabetic character in the input string. Non-alphabetic characters simply maintain their present value. If the input string is longer than the encryption string, simply reuse mapped values from the encryption string. For instance, if the encryption string has 10 characters (index values 0 - 9), when processing the 11th input character (index 10), simply use the input character index % length of encryption string (in this case 10 % 10 is 0) to select the value from the encryption string to use for mapping.

The decryption process is basically the same as the encryption process. The only difference is the value of the mapped character from the encryption string.

For lower case encryption, the mapped value = character from encryption string - 'a'
For upper case encryption, the mapped value = character from encryption string - 'A'

For lower case decryption, the mapped value = 26 - (character from encryption string - 'a')
For upper case decryption, the mapped value = 26 - (character from encryption string - 'A')

Program Requirements

Your program must meet the following requirements:

1. You must ask the user if they want to perform an encryption or decryption operation.
2. You must ask the user to enter the name of the file they want to encrypt or decrypt.
3. You must get an encryption key from the user which can be up to 128 characters. The key must be all lower case alphabetic characters.
4. You must have a function which takes the encryption key and creates an encryption map from it. For each character in the encryption key string, subtract the lower case letter 'a' and store the result in the corresponding encryption map array.
5. You must have a function which takes the encryption key and creates a decryption map from it. For each character in the encryption key string, subtract the lower case letter 'a' from it. Then subtract that result from 26 and store the value in the corresponding decryption map array.
6. You must have a function which will do the encryption or decryption transformation. This function takes the following parameters:

            A constant C string containing the line of text to be transformed.
            A constant C character array which contains the encryption or decryption map.
            An integer which contains the length of the encryption map.
            A string reference (output) which will contain the encrypted or decrypted string upon completion.

The core of the encryption / decryption algorithm is as follows:

            For each character (the ith character) in the text input line do the following:
                        if the character is not alphabetical, add it to the end of the output string
                        if the character is lower case alphabetical
                                    subtract the character 'a' from the character
                                    get the ith % map length element from the map and add it to the character
                                    adjust the value of the character % 26 to keep it within the alphabet
                                    add the character 'a' to the character
                                    add the encrypted character value to the end of the output string
                        if the character is upper case alphabetical
                                    do the same thing as for lower case except use 'A' instead of 'a'

7. For decryption, the main program should create an ifstream for the file to be decrypted. It should use the getline method of the ifstream to read lines from the file, call the encryption / decryption function with the line to be decrypted, and display the string which contains the result of the encryption / decryption function call. Repeat until the ifstream reaches the end of the file, then close the ifstream.

8. For encryption, the main program should create an ifstream for the file to be encrypted. It should also create an ofstream for the file where the encrypted result will be stored. The file name for this file can be gotten from the user or can be the input file name with a special extension added at the end. The getline method of the ifstream is used to read lines from the input file. Then the encryption / decryption function is called to encrypt the line. Display the string containing the result and write the string to the ofstream. Close the ifstream and ofstreams when finished.

9. Make sure that your program allows the user to encrypt / decrypt more than one file per session. This means adding a loop which allows the entire program to repeat until the user has nothing more to do.

Hints

            1. Use C strings for the encryption string and the file names. Use char arrays for the encryption and decryption maps. You cannot treat these as C strings because the maps can contain 0 as a valid data item rather than the end of string marker.

            2. Use a string type variable to hold the encrypted and decrypted strings. The string type allows you to add characters to the end of a string using the push_back method, and it allows you to dump the contents of the string using the erase method.

            3. For input streams, you can use the eof method to determine when you have reached the end of a file.

            4. Use a character array to read data from the files. Set the maximum length for this buffer to be 256 characters.

Development Strategy

I would recommend that you build this project in two phases. The first phase should concentrate on getting the encryption and decryption map functions and the encryption / decryption function working. You can test this by using fixed C strings for the input line and the encryption string. Call the map functions, then encrypt the fixed input string, output the result, then decrypt the encrypted string and output the result. When your final output is the same as the original input, your encryption / decryption functions are working. The second phase adds the file operations.

Testing and Deliverables

When you think you have a working program, use Notepad to create a file with plain text in it. You should enter some different length lines containing a variety of characters. Your file should have at least 10 lines. You should try using short and long encryption keys. Using your program, encrypt the file, then decrypt the encrypted file. Take a screen shot of your decrypted output and paste it into a Word document. Also copy the contents of your original file and the encrypted file into the Word document. Clearly label the contents of the Word document. Then copy your source code into your document. Make sure that you have used proper coding style and commenting conventions!

Reference no: EM13165513

Questions Cloud

Use the henderson-hasselbach equation : Use the Henderson-Hasselbach equation to calculate the pH of an acetate buffer in which the acetate concentration [CH3COO-] is three times greater than the acetic acid [CH3COOH] with a pKa of 4.76.
State what happen to the carbon level of the carbonyl carbon : What happens to the carbon level of the carbonyl carbon when a Grignard reacts with acetone? What happens to the carbon level
Arrays & more loops practice : Write a program ArraysAndLoops and implement the following in the main method:
State what kind of compound is dihydroxypentane : What kind of compound is 2,3-dihydroxypentane? From what precursor do you synthesize the kind of compound that 2,3-dihydroxypentane is?
The main program should create an ifstream : For decryption, the main program should create an ifstream for the file to be decrypted. It should use the getline method of the ifstream to read lines from the file, call the encryption / decryption function with the line to be decrypted, and dis..
People must be in a group in order to guarantee : How many people must be in a group in order to guarantee that two people in the group have the same birthday (don't forget leap year)?
This function should accept a two-dimensional : getLowestInRow. This function should accept a two-dimensional array as its argument and an integer as its second argument. The second argument should be the subscript of a row in the array. The function should return the lowest value in the specif..
Considered to be an improved version : Part (c) is considered to be an improved version of Part (b). You may use an array (2-dimessional) to store some values that has been computed during the run so that when making recursive calls the program does not compute certain values over and ..
What mass of this substance must evaporate : What mass of this substance must evaporate in order to freeze 112 of water initially at 18? (The heat of fusion of water is 334 the specific heat of water is 4.18 .

Reviews

Write a Review

C/C++ Programming Questions & Answers

  C++ pointer function synopsis

C++ pointer Function Synopsis: char *amonthLess(char *dateString) Description: Variable dataString is a valid date in a form of mm/dd/yyyy Given the above information, write a main() program that asks a user to enter a date in a form of mm/dd/yyyy..

  Write a method named negative sum

Write a method named negativeSum that accepts a Scanner as a parameter reading input from a file containing a series of integers, and determine whether the sum starting from the first number is ever negative

  Implementation of classes

Implementation of classes Chart and BarChart. Class barChart chould display a simple textual representation of the data

  Write a program in c that will find smallest value

Write a programe c that will find the smallest, largest and average values in a collection of N numbers.Get the value of N before scanning each value in the collection of N numbers.

  Users to input two forces by their components

write a programm to ask users to input two forces by their components of (Fx1,Fy1) and (Fx2,Fy2) from the keyboard.call twice the function to display both magnitude and direction angle of two forces on the screen.add two forces and display both magni..

  Program that can serve as a simple calculator

Write a program that can serve as a simple calculator. This calculator keeps track of a single number (of type double) that is called result and that starts out as 0.0. Each cycle allows the user to repeatedly add, subtract, multiply, or divide by..

  Implement a class to represent a matrix

Implement a class to represent a matrix. While doing this exercise, you are allowed only to use C++ primitive types and arrays. You may not use STL in your Matrix definition. You must use dynamic memory.

  Write a program in c of fibonacci series

Write a program in c of fibonaci series with and without using fibo func, both

  Design a deck plan space ship in eclipse

Develop a simple interactive two-dimensional spaceship deck plan editor using OpenGL and GLUT. Your program will enable a user to create and save a deck plan of a hypothetical spaceship comprising the hull walls.

  Program to compute gross wages for employee using array

Write program which uses the following arrays: payRate: array of seven floats to hold each employee's hourly pay rate. wages: array of seven floats to hold each employee's gross wages.

  Assessment system of a university

Write a program for Assessment system of a University

  Implement a standard sorted linked list class

Write C++ Program:Implement a standard SORTED linked list class. Be sure to include constructor/copy constructor, destructor, and assignment operator overload.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd