Encrypt and decrypt messages

Assignment Help Basic Computer Science
Reference no: EM13317009

Goal

You will write a program in C, in the Ubuntu Linux environment, to provide the end user with the ability to encrypt and decrypt messages, using a secret key. Your program will prompt the user to indicate whether they wish to encrypt a readable ("plaintext") message or decrypt an already encrypted sequence of numbers ("ciphertext") back to its readable form. You will implement the encryption and decryption algorithm described in the instructions below. In order to prevent your enemies from easily cracking your encrypted messages, the algorithm will use an incrementing counter to encrypt each character in a slightly different way. Your program will output the result (either the ciphertext or the plaintext) to the screen. You will begin with the skeleton code found here.

Learning Objectives

• familiarize yourself with the Linux programming environment
• write a small program in C that is modular, correctly designed and documented
• manipulate values at the bit level

Reference no: EM13317009

Questions Cloud

How long does doug have to open door before fatality limit : Doug decides to use a turkey fryer to prepare the Thanksgiving turkey. Due to cold weather, he prepares the turkey with the door closed, limiting air exchage (Q) within the 40 m3 garage to 0.2 m3 min-1
Projected total unit workload-patient classification level : Based on susan's projection of patient days, what is the projected total unit workload by patient classification level? What differences do you notice between the projected and the historic total unit workload?
Explain why should find another spot to camp : Based upon the recommended level for CO of 40 mg/m3, the given conditions, AND the fact that the fire will be burning ALL night, should you find another spot to camp b.
Determine the diameter of the hole : A large storage tank, open at the top and filled with water, develops a small hole in its side at a point 16.4 m below the water level. Determine the diameter of the hole
Encrypt and decrypt messages : Write a program in C, in the Ubuntu Linux environment, to provide the end user with the ability to encrypt and decrypt messages, using a secret key
Determine the radius of the circle : Three point charges, -6.05 10-9 C, -9.75 10-9 C, and +7.50 10-9 C, are fixed at different positions on a circle. What is the radius of the circle
Students for fair tuition-down with fascist tuition increase : Members of Students for Fair Tuition (SFT) decide to protest rising tuition costs at Gigantic State University (GSU) by taking over Dunfee Hall, the location of GSU president Dalton Chandler’s office. As they storm into the reception area of Chandler..
Determine the magnitude of the z component of the reaction : The geometry of the rod assembly is given as a=2.8 m, b=0.950 m, c=1.00 m, and d=0.600 m. Neglect the weight of the rod. The journal bearing supports the rod in such a manner that it is free to rotate in the Z-direction.
Calculate the electron speed : In a television picture tube, electrons strike the screen after being accelerated from rest through a potential difference of 33 500 V. find the electron speed just before the electron strikes the screen

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Employees may work from home

Employees may work from home up to 15 hours per week. Each project leader needs a list of current means of contacting each member of the project team: home phone and home FAX number. To contact employees "on the road" the project leaders also need..

  Design complete system of timer using 8086 and peripherals

Real-time systems often require precise timing for data sampling and control operations. This is usually achieved through the use of a programmable timer circuit that periodically interrupts the main processor at precise times.

  Which accepts no value and returns an int

There is also an int variable called currentTemp , which has already been declared. Use the reference variable, to invoke a method to retrieve the previously set temperature and store the returned value in currentTemp .

  Create a jsp that returns the name of the browser

I need to create a JSP that returns the name of the browser that is being used to display the page

  Describe valid advice for naming variables

Which of the given is valid advice for naming variables? To save typing, make most variable names one or two letters. to avoid conflict with names which others are using , utilize unusual or unpronounceable names.

  Write a loop that counts the number of space characters

Write a loop that counts the number of space characters that appear in the String object str.

  Hardware and system software qualify as infrastructure

What is infrastructure? In what was do hardware and system software qualify as infrastructure? What basic strategic planning questions should be addressed with respect to infrastructure?

  Develop requirements traceability matrix

The GlobalUBid.Com Case Study will be used to develop a requirements traceability matrix describing and following the life of requirements in both the forward and backward direction.

  This thesis artefact is flexible

This thesis artefact is flexible in a sense that helper can use any other sort of tools to accomplish the task as long as it matches with the aim but please, let me know how he/ she going to do it.

  What would be the best choice of the degree

A B+ - tree index is to be built on the name attribute of the relation student. Assume that all the student names are o length 8bytes, disk blocks are of size 512 bytes , and index pointer are of size 4bytes. Given this scenariom, what would be th..

  College or organization is considering a new project

Suppose your college or organization is considering a new project that would involve developing an information system that would allow all employees and students/customers to access and maintain their own human

  What technologies should be used to secure these areas

On what areas should the security policy focus (physical security, data security, auditing, passwords, and so forth), and what technologies should be used to secure these areas?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd