Enforcing privacy with cryptography

Assignment Help Basic Computer Science
Reference no: EM132803552

The explosive growth of Internet communications and data storage on Internet-connected computers has greatly increased privacy concerns. The field of cryptography is concerned with coding data to make it difficult (and hopefully-with the most advanced schemes-impossible) for unauthorized users to read. In this exercise you'll investigate a simple scheme for encrypting and decrypting data. A company that wants to send data over the Internet has asked you to write a program that will encrypt it so that it may be transmitted more securely. All the data is transmitted as four-digit integers. Your app should read a four-digit integer entered by the user and encrypt it as follows: Replace each digit with the result of adding 7 to the digit and getting the remainder after dividing the new value by 10. Then swap the first digit with the third, and swap the second digit with the fourth. Then display the encrypted integer. Write a separate app that inputs an encrypted four-digit integer and decrypts it (by reversing the encryption scheme) to form the original number. Use the format specifier D4 to display the encrypted value in case the number starts with a 0. The format specifier D is used to format integer values, and D4 indicates that the value should be formatted with a minimum of four digit positions, possibly with leading zeros.

Reference no: EM132803552

Questions Cloud

Virtual memory and especially when virtual machines : The control of the serialization of memory management is difficult in a "Virtual Memory" and especially when "Virtual Machines" are included.
Organ leader and research paper : What is your definition of AI? Please explain. What is your opinion of AI, is the technology currently available? Why or why not?
Describe the purpose of destructor method : Describe the purpose of a destructor method. Explain when destructors are called, and note that a default destructor is provided automatically.
Multilevel business intelligence setup : Explain a multilevel business intelligence setup, and describe how this type of arrangement affects the framework of an organization's decision-making processes
Enforcing privacy with cryptography : The explosive growth of Internet communications and data storage on Internet-connected computers has greatly increased privacy concerns.
Transforming business and relationship to globalization : How information systems are transforming business and their relationship to globalization.
E-business strategy : Factual and prediction of what the future may hold for eBay? Does eBay continue to be a valid commerce method?
Big data analytics : How Big Data analytics can be used with Smart Cities. This is exciting and can provide many benefits to individuals as well as organizations.
Access control takes into account human nature : Discuss how Access Control takes into account human nature of their employees to protect the system.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Describe an algorithm

Describe an algorithm for determining if a given list contains a cycle using only constant additional space. The runtime should be O(N), where N is the (unknown) number of elements in the list. (Hint: use two iterators that advance at different sp..

  Draw comparisons with software architecture

Draw comparisons with software architecture. How are the disciplines of classical architecture and the software architecture similar? How do they differ?

  Personnel should have access to the it infrastructure

1. How do you determine which personnel should have access to the IT infrastructure? Should a CEO automatically have access? Should a CIO?

  Working capital requirements

Create Excel model with a direct cash flow forecast for the next generation Impala using the information below.

  Penetration testing is simulated cyberattack

Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities.

  Explain the difference between bounded

Explain the difference between bounded and unbounded media, and provide examples of each that are commonly found in homes, schools, or area businesses.

  Important factors that we need to consider

What are the important factors that we need to consider when choosing data structures?

  Creating a work breakdown structure

In no less than one hundred words What resources might we consider when creating a work breakdown structure (WBS)? Is all about technical issues?

  Important requirements for an msds

Explain the most important requirements for an MSDS to an organization's Environmental Health and Safety (EHS) programs and protocols

  What does malware free mean

What does "malware free" mean? How can a user demonstrate that their computer or device is malware free?

  Random needs major body work

What is the probability that a car selected at random needs major body work if it is known that it needs to be painted?

  The negative effects of globalization irreversible

This section will vary in length and demonstrate your ability to utilize quantitative and/or qualitative data and scientific inquiry in development of your final paper. You may choose your methodology according to the data collection that best ref..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd