Answered step by step
Verified Expert Solution
Link Copied!
Question
1 Approved Answer

At this point in the course, you have developed a good understanding of the need to perform encryption in as the basic Caesar cipher, and

image text in transcribed
At this point in the course, you have developed a good understanding of the need to perform encryption in as the basic Caesar cipher, and the more advanced AES RSA (public key encryption) algorithms. secure computer systems. We have learned many encryption schemes such (Symmetric key encryption) and Using the outline of the caesar_cipher) function that was developed in class, develop the code to take a message in plain text form and convert it to cipher text. Use this framework to perform decryption of cipher text. For the first part of this project, you must rely on user feedback to determine whether any further decryption is necessary. A sample of the expected outcome will be demonstrated by the instructor in class. 1. 2. For the second part of this project, you must have your program decipher the message without any user inputs/feedback. You will need to create and use your own dictionary file. The dictionary (file) must contain at least 200 words (something with 1000+ words would be much more appropriate). It must contain at least the words used by each of the three teams to create their own cipher texts. Your program must decipher each of the three cipher text messages created at the beginning of the semester. To demonstrate the robustness of your code, you should include as many examples of cipher text as possible (10+) in your final deliverable 3. Write up (Third part of the project): Compare and contrast the approaches in your solutions above. Compare the two approaches based on'the following criteria: i) programming effort required for the two approaches ii) the amount of intelligence required in the two programs, iii) the usability of the programs Describe also the difficulties you encountered in your project implementation, and your solutions/workarounds to those difficulties. Note: This project is to be done as a team. Note: In class, the instructor has used C for demonstrating his implementation of various features of encryption techniques needed for this project

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image
Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Intelligent Information And Database Systems Asian Conference Aciids 2012 Kaohsiung Taiwan March 19 21 2012 Proceedings Part 3 Lnai 7198

Authors: Jeng-Shyang Pan ,Shyi-Ming Chen ,Ngoc-Thanh Nguyen

2012th Edition

3642284922, 978-3642284922

More Books

Students explore these related Databases questions