About the encryption and decryption

Assignment Help Computer Engineering
Reference no: EM13852202

Goal

You will write a program in C, in the Ubuntu Linux environment, to provide the end user with the ability to encrypt and decrypt messages, using a secret key. Your program will prompt the user to indicate whether they wish to encrypt a readable ("plaintext") message or decrypt an already encrypted sequence of numbers ("ciphertext") back to its readable form. You will implement the encryption and decryption algorithm described in the instructions below. Your program will output the result (either the ciphertext or the plaintext) to the screen. You will begin with the skeleton code attached.

Learning Objectives

• write a small program in C that is modular, correctly designed and documented
• manipulate values at the bit level

Instructions
1. get/set/clear bit functions Implement the getBit, setBit and clearBit functions, exactly as we saw in class.

2. "skip xor" function Implement the skipx function, which works for both encryption and decryption, i.e. the same algorithm is used for translation in both directions. This function takes one source byte (either plaintext or ciphertext) and a key, and it returns the corresponding encrypted or decrypted resulting byte.

The skipx function must have the following prototype: unsigned char skipx(unsigned char source, unsigned char key) The function must use the following algorithm:

• begin with your resulting byte assigned the value of the source byte

• loop over every odd-numbered bit of the source byte, starting at bit position 7

• perform an xor operation between the current odd-numbered source bit, for example at bit position i and the even-numbered bit of the key corresponding to bit position (i-1)

• set the corresponding odd-numbered bit of the resulting byte to the result (0 or 1) of the xor operation

• return the resulting byte

Note:

• you must use the getBit, setBit and clearBit functions everywhere applicable 3. "rotr" function Implement the rotr function that performs a circular right shift on a byte. Your function will take one byte, shift all the bits one position to the right, taking the least significant bit and placing it into the most significant bit position, and return the result. The rotr function must have the following prototype: unsigned char rotr(unsigned char source)

4. Encryption and decryption Fill in the missing code in the main function of the provided skeleton code:

• if the user chooses to encrypt a message, the program:

mpptr s the user to enter a plaintext message

prompts the user to enter a numeric key (remember the valid range for unsigned chars!)

loops over each character (i.e. each byte) of the plaintext and uses the skipx function to encrypt it o updates the key at every iteration by performing a circular right shift on it  prints the encrypted message as a sequence of numbers to the screen

• if the user chooses to decrypt a message, the program:

mpptr s the user to enter an encrypted message (ciphertext) as a sequence of numbers (read as unsigned chars) terminated by -1

prompts the user to enter a numeric key (remember the valid range for unsigned chars!) o loops over each number of the ciphertext and uses the skipx function to decrypt it updates the key at every iteration by performing a circular right shift on it o prints the decrypted message to the screen

Notes:

• remember! you must use the same key value to decrypt a message as was used to encrypt it

• your program must perform all basic error checking

Testing: You will know that your program works correctly if it can decrypt the following sequence using key 178

114 199 105 196 34 90 242 229 71 208 105 197 111 79 242 249 0 193 103 221 108 94 160 236 82 205 101 136 50 -1

Constraints

• you must use the skeleton program provided and use the function prototypes exactly as stated

• do not use any global variables

• you must use all the functions that you implement and reuse functions everywhere possible

• your program must be thoroughly commented

Submission

You will submit one tar file that includes all the following:

• all source code

• a readme file that includes:

 a preamble (purpose, list of source/header/data files) o the exact compilation command
aunlching and operating instructions

Reference no: EM13852202

Questions Cloud

Loan amortization and ear : Loan amortization and EAR You want to buy a car, and a local bank will lend you $10,000. The loan will be fully amortized over 5 years (60 months), and the nominal interest rate will be 9% with interest paid monthly.
Pratt company uses activity-based costing : Pratt Company uses activity-based costing (ABC). Pratt manufactures outdoor water toys using two activities: plastic injection molding and decal application. Pratt's 2013 total budgeted overhead costs for these two activities are $436,000 (70% for in..
To what extent does the threat posed by global terrorist : Traditional notions of ‘security' focus on external threats to the state's survival. To what extent does the threat posed by global terrorist organisations challenge this traditional notion of ‘security'?
What are supply shocks : What are supply shocks? Explain what effect adverse and favorable supply shocks have on the supply curve. Give an example of a supply shock that has affected the U.S. economy on more than one occasion
About the encryption and decryption : Encryption and decryption Fill in the missing code in the main function of the provided skeleton code
Determine tension in the rope : Assume that the masses of the chains, pulleys, and ropes are negligible. Determine the tension in the rope when the crate is being lifted with constant speed.
Important to the management of business projects : Briefly explain why the topic you are discussing is important to the management of business projects - what type of audience is the paper is directed: a novice, a senior manager who knows nothing about projects management, a PM practitioner
Xyz corporation is considering an expansion project : XYZ Corporation is considering an expansion project. To date they have spent $51,400 investigating the viability of the project and have decided to proceed. The CEO of XYZ spent $22,100 last year on his business trip to New York where he discussed ab..
Coefficient of static friction : What is Moe's horizontal displacement from his original location? What is Moe's speed when he hits the ground? What is the minimum possible value for Curley's coefficient of static friction if he does not move?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Determining the companys checkbook or ledger

The subcontractor says that original check was for only $10,750. Jonathan looks around office however was not able to determine the company checkbook or ledger.

  Computer logic and architecture

Convert 0.10112 to decimal using he conventional polynomial method. Convert 0.10112 to decimal using the radix multiply method.

  Examples of suitable values for each of subsequent type

Give examples of suitable values for each of the subsequent type expressions. Do not use the empty list as the value for any list component.

  Software is required for a simple house burglar alarm

software is required for a simple house burglar alarm system.house burglar alarm specificationa house has two rooms

  Advantages of using hypervisor in enterprise

Examine the technical advantages and disadvantages of using a hypervisor in an enterprise. Compare and contrast the hypervisors from Microsoft (Hyper-V), VMware (ESXi), and Hitachi's (Virtage). Evaluate the effect of hypervisors on the TCO (Total ..

  How this technology works

"An emerging technology not in use at the company such as a wireless network or PDAs."

  What is autonomic relational database management system

In regards to Autonomic RDBMS, is it important to utilize a user-centered design (UCD) approach when designing a database for a small to medium size company. Why or why not.

  Sql query to determine lowest, highest, average salary

Let's assume that we wanted to determine the lowest, highest, average and total number of the salaries by department in company. What SQL query would provide us this.

  Design a shannon-fano code

Design a Shannon-Fano code for the above three-symbol source alphabet shown above and find its code efficiency. Compare it with your answer in part (b)

  How many bits are required to reference a page frame

A system has a virtual memory space of 8 virtual pages for a process with 4 blocks per page and 8 words per block. The main memory consists of 32 page frames with 4 blocks per page and 8 words per block. How many bits are required to reference a p..

  Consider this scenario mr brown and mr green have argued

consider this scenario mr. brown and mr. green have argued several times about which one of them has the slowest horse.

  The least number of telephones an end office

take a simple telephone network consisting of two end offices and one intermediate switch with a 1-MHz full-duplex trunk between each end office and the intermediate switch.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd