Program to encrypt messages using the caesar cypher

Assignment Help Computer Network Security
Reference no: EM13693779

Can you provide the answer of this question?

Question: The field of cryptography concerns methods for per-forming encryption, which takes a message, called the plaintext, and converts it into a scrambled message, called the ciphertext.

The reverse process of decryption takes the ciphertext and converts it back into the plaintext.

One of the earliest encryption schemes is the Caesar cipher, named after Julius Caesar, who used it to protect military communications.

The Caesar cipher works by replacing each letter in the plaintext with the letter that comes three letters after it in the alphabet for that language. In English, each 'A' would be replaced with 'D', each 'B' with 'E', and so on up to 'W', which is replaced by 'Z'.

Then we "wrap around", replacing 'X' with 'A', 'Y' with 'B', and 'Z' with 'C'. These rules apply for lower case letters as well.

Punctuation and spaces are not changed. Write a program to encrypt messages using the Caesar cypher. The input is a single line containing letters of either case, punctuation, and spaces.

The output is a single line containing the ciphertext. For example, if the input is Attack at dawn! then the output should be Dwwdfn dw gdzq!

Can you answer this problem using basic computer networking concepts and securities.

I'm not sure how to solve the question. Can anyone help me?

Reference no: EM13693779

Questions Cloud

Explain why bits are not real as if you were nyquist : Explain why bits are not real as if you were Nyquist. Then Using Nyquist formula explains how to create this bits abstraction? Can you answer this question? Provide answer with example.
Explain how many kilograms of h2so4 are present : Problem- If the pH of a 1.5-in. rainfall over 1600mi2 is 3.1, how many kilograms of H2SO4 are present, assuming that it is the only acid contributing to the pH?
Program that tests if an input string is a palindrome : Write a recursive method that takes a string as argument and returns the reverse of the string (given the argument "Horse" your method should return the string "esroH").
Identify which halogen is in which bottle : Problem- You are given Br2 water and I2 water however the bottles are not labeled. The color of both solutions is similar. What reaction would you perform to identify which halogen is in which bottle
Program to encrypt messages using the caesar cypher : The field of cryptography concerns methods for per-forming encryption, which takes a message, called the plaintext, and converts it into a scrambled message, called the ciphertext
How many millimoles of acetate need to add to the solution : Problem- You need to produce a buffer solution that has a pH of 5.44. You already have a solution that contains 10. mmol (millimoles) of acetic acid. How many millimoles of acetate (the conjugate base of acetic acid) will you need to add to this s..
Moles of water, copper and sulfate were in the compound : The sample lost 0.506g of mass. After reacting with aluminum wire, 0.595g of copper was recovered. How many moles of water, copper and sulfate were in the compound. What is the mole ratio of these 3 components
Process of buying a soda from a soda machine : Please write a Java Program those steps through the process of buying a soda from a Soda Machine.  You must interact with the consumer. Each Soda is one dollar.
Propose a three-step synthesis of hexanal : Problem- Begining with sodium acetylide (NaCCH), propose a three-step synthesis of hexanal.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd