About the encryption and decryption

Assignment Help Computer Engineering
Reference no: EM13852202

Goal

You will write a program in C, in the Ubuntu Linux environment, to provide the end user with the ability to encrypt and decrypt messages, using a secret key. Your program will prompt the user to indicate whether they wish to encrypt a readable ("plaintext") message or decrypt an already encrypted sequence of numbers ("ciphertext") back to its readable form. You will implement the encryption and decryption algorithm described in the instructions below. Your program will output the result (either the ciphertext or the plaintext) to the screen. You will begin with the skeleton code attached.

Learning Objectives

• write a small program in C that is modular, correctly designed and documented
• manipulate values at the bit level

Instructions
1. get/set/clear bit functions Implement the getBit, setBit and clearBit functions, exactly as we saw in class.

2. "skip xor" function Implement the skipx function, which works for both encryption and decryption, i.e. the same algorithm is used for translation in both directions. This function takes one source byte (either plaintext or ciphertext) and a key, and it returns the corresponding encrypted or decrypted resulting byte.

The skipx function must have the following prototype: unsigned char skipx(unsigned char source, unsigned char key) The function must use the following algorithm:

• begin with your resulting byte assigned the value of the source byte

• loop over every odd-numbered bit of the source byte, starting at bit position 7

• perform an xor operation between the current odd-numbered source bit, for example at bit position i and the even-numbered bit of the key corresponding to bit position (i-1)

• set the corresponding odd-numbered bit of the resulting byte to the result (0 or 1) of the xor operation

• return the resulting byte

Note:

• you must use the getBit, setBit and clearBit functions everywhere applicable 3. "rotr" function Implement the rotr function that performs a circular right shift on a byte. Your function will take one byte, shift all the bits one position to the right, taking the least significant bit and placing it into the most significant bit position, and return the result. The rotr function must have the following prototype: unsigned char rotr(unsigned char source)

4. Encryption and decryption Fill in the missing code in the main function of the provided skeleton code:

• if the user chooses to encrypt a message, the program:

mpptr s the user to enter a plaintext message

prompts the user to enter a numeric key (remember the valid range for unsigned chars!)

loops over each character (i.e. each byte) of the plaintext and uses the skipx function to encrypt it o updates the key at every iteration by performing a circular right shift on it  prints the encrypted message as a sequence of numbers to the screen

• if the user chooses to decrypt a message, the program:

mpptr s the user to enter an encrypted message (ciphertext) as a sequence of numbers (read as unsigned chars) terminated by -1

prompts the user to enter a numeric key (remember the valid range for unsigned chars!) o loops over each number of the ciphertext and uses the skipx function to decrypt it updates the key at every iteration by performing a circular right shift on it o prints the decrypted message to the screen

Notes:

• remember! you must use the same key value to decrypt a message as was used to encrypt it

• your program must perform all basic error checking

Testing: You will know that your program works correctly if it can decrypt the following sequence using key 178

114 199 105 196 34 90 242 229 71 208 105 197 111 79 242 249 0 193 103 221 108 94 160 236 82 205 101 136 50 -1

Constraints

• you must use the skeleton program provided and use the function prototypes exactly as stated

• do not use any global variables

• you must use all the functions that you implement and reuse functions everywhere possible

• your program must be thoroughly commented

Submission

You will submit one tar file that includes all the following:

• all source code

• a readme file that includes:

 a preamble (purpose, list of source/header/data files) o the exact compilation command
aunlching and operating instructions

Reference no: EM13852202

Questions Cloud

Loan amortization and ear : Loan amortization and EAR You want to buy a car, and a local bank will lend you $10,000. The loan will be fully amortized over 5 years (60 months), and the nominal interest rate will be 9% with interest paid monthly.
Pratt company uses activity-based costing : Pratt Company uses activity-based costing (ABC). Pratt manufactures outdoor water toys using two activities: plastic injection molding and decal application. Pratt's 2013 total budgeted overhead costs for these two activities are $436,000 (70% for in..
To what extent does the threat posed by global terrorist : Traditional notions of ‘security' focus on external threats to the state's survival. To what extent does the threat posed by global terrorist organisations challenge this traditional notion of ‘security'?
What are supply shocks : What are supply shocks? Explain what effect adverse and favorable supply shocks have on the supply curve. Give an example of a supply shock that has affected the U.S. economy on more than one occasion
About the encryption and decryption : Encryption and decryption Fill in the missing code in the main function of the provided skeleton code
Determine tension in the rope : Assume that the masses of the chains, pulleys, and ropes are negligible. Determine the tension in the rope when the crate is being lifted with constant speed.
Important to the management of business projects : Briefly explain why the topic you are discussing is important to the management of business projects - what type of audience is the paper is directed: a novice, a senior manager who knows nothing about projects management, a PM practitioner
Xyz corporation is considering an expansion project : XYZ Corporation is considering an expansion project. To date they have spent $51,400 investigating the viability of the project and have decided to proceed. The CEO of XYZ spent $22,100 last year on his business trip to New York where he discussed ab..
Coefficient of static friction : What is Moe's horizontal displacement from his original location? What is Moe's speed when he hits the ground? What is the minimum possible value for Curley's coefficient of static friction if he does not move?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd