Program to encrypt messages using the caesar cypher

Assignment Help Computer Network Security
Reference no: EM13693779

Can you provide the answer of this question?

Question: The field of cryptography concerns methods for per-forming encryption, which takes a message, called the plaintext, and converts it into a scrambled message, called the ciphertext.

The reverse process of decryption takes the ciphertext and converts it back into the plaintext.

One of the earliest encryption schemes is the Caesar cipher, named after Julius Caesar, who used it to protect military communications.

The Caesar cipher works by replacing each letter in the plaintext with the letter that comes three letters after it in the alphabet for that language. In English, each 'A' would be replaced with 'D', each 'B' with 'E', and so on up to 'W', which is replaced by 'Z'.

Then we "wrap around", replacing 'X' with 'A', 'Y' with 'B', and 'Z' with 'C'. These rules apply for lower case letters as well.

Punctuation and spaces are not changed. Write a program to encrypt messages using the Caesar cypher. The input is a single line containing letters of either case, punctuation, and spaces.

The output is a single line containing the ciphertext. For example, if the input is Attack at dawn! then the output should be Dwwdfn dw gdzq!

Can you answer this problem using basic computer networking concepts and securities.

I'm not sure how to solve the question. Can anyone help me?

Reference no: EM13693779

Questions Cloud

Explain why bits are not real as if you were nyquist : Explain why bits are not real as if you were Nyquist. Then Using Nyquist formula explains how to create this bits abstraction? Can you answer this question? Provide answer with example.
Explain how many kilograms of h2so4 are present : Problem- If the pH of a 1.5-in. rainfall over 1600mi2 is 3.1, how many kilograms of H2SO4 are present, assuming that it is the only acid contributing to the pH?
Program that tests if an input string is a palindrome : Write a recursive method that takes a string as argument and returns the reverse of the string (given the argument "Horse" your method should return the string "esroH").
Identify which halogen is in which bottle : Problem- You are given Br2 water and I2 water however the bottles are not labeled. The color of both solutions is similar. What reaction would you perform to identify which halogen is in which bottle
Program to encrypt messages using the caesar cypher : The field of cryptography concerns methods for per-forming encryption, which takes a message, called the plaintext, and converts it into a scrambled message, called the ciphertext
How many millimoles of acetate need to add to the solution : Problem- You need to produce a buffer solution that has a pH of 5.44. You already have a solution that contains 10. mmol (millimoles) of acetic acid. How many millimoles of acetate (the conjugate base of acetic acid) will you need to add to this s..
Moles of water, copper and sulfate were in the compound : The sample lost 0.506g of mass. After reacting with aluminum wire, 0.595g of copper was recovered. How many moles of water, copper and sulfate were in the compound. What is the mole ratio of these 3 components
Process of buying a soda from a soda machine : Please write a Java Program those steps through the process of buying a soda from a Soda Machine.  You must interact with the consumer. Each Soda is one dollar.
Propose a three-step synthesis of hexanal : Problem- Begining with sodium acetylide (NaCCH), propose a three-step synthesis of hexanal.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Academic method to project management

Sunnyville Corporation is in the business of selling home appliances. Sunnyville Corporation  has over 50 sales agents across the country. The management at Sunnyville Corporation has decided to implement an online sales program.

  Commutative and ecb mode

Give an example to show that the group of permutations S5 is not commutative and ECB mode with block length 3 and the permutation cipher for the given operation

  A determine the elements of the risk management framework b

to foster and develop national preparedness and encourage the exploration of risk related interdependencies across the

  Security risk to acknowledge using macros

Write down 200- to 300-word response which answers the following question: Based on article by Lenning (2005), what is main security risk which users must acknowledge when using macros?

  Report on information security planning and policy

Write a research report on information security planning and policy. Based on information security planning and policy around 3000 words.

  What will be your plan to enhance your network security

Assume that you are the network security officer of one company, what will be your plan to enhance your network security (firewall? VPN? Content level protection? Or combination of them?) More details about your security infrastructure design will..

  How many bits is the encrypted message

How many bits is the encrypted message - find the corresponding code for the first letter of your first name, add 1 to the left position of the most significant bit

  Design an algorithm to achieve the byzantine agreement

Design an algorithm to achieve the Byzantine Agreement for the case that there are four processes, amongst which one is corrupted.

  What is the principle of adequate protection

What is the difference between a threat and a vulnerability? Define each, and then give at least one example of a threat and of a vulnerability.

  Email viruses are typically launched by people

Email viruses are typically launched by people who modify header information to hide their identity. Brightmail's Enrique Salem says that in the future

  Define cybercrimes and computer security

Evaluate how teamwork and leadership are effective tools for financial forensic investigations. Provide support for your evaluation.

  How does it affect performance and security

Sector level hard disk encryption is one of the most interesting problems of all. Assume that AES-128 is used to encrypt your local hard disk. What mode will you use? CBC or ECB?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd