Answered step by step
Verified Expert Solution
Question
1 Approved Answer
At this point in the course, you have developed a good understanding of the need to perform encryption in as the basic Caesar cipher, and
At this point in the course, you have developed a good understanding of the need to perform encryption in as the basic Caesar cipher, and the more advanced AES RSA (public key encryption) algorithms. secure computer systems. We have learned many encryption schemes such (Symmetric key encryption) and Using the outline of the caesar_cipher) function that was developed in class, develop the code to take a message in plain text form and convert it to cipher text. Use this framework to perform decryption of cipher text. For the first part of this project, you must rely on user feedback to determine whether any further decryption is necessary. A sample of the expected outcome will be demonstrated by the instructor in class. 1. 2. For the second part of this project, you must have your program decipher the message without any user inputs/feedback. You will need to create and use your own dictionary file. The dictionary (file) must contain at least 200 words (something with 1000+ words would be much more appropriate). It must contain at least the words used by each of the three teams to create their own cipher texts. Your program must decipher each of the three cipher text messages created at the beginning of the semester. To demonstrate the robustness of your code, you should include as many examples of cipher text as possible (10+) in your final deliverable 3. Write up (Third part of the project): Compare and contrast the approaches in your solutions above. Compare the two approaches based on'the following criteria: i) programming effort required for the two approaches ii) the amount of intelligence required in the two programs, iii) the usability of the programs Describe also the difficulties you encountered in your project implementation, and your solutions/workarounds to those difficulties. Note: This project is to be done as a team. Note: In class, the instructor has used C for demonstrating his implementation of various features of encryption techniques needed for this project
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started