Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

C PROGRAMMING !!!!!! Below are some example interactions with the program. Your code should produce the same results: Example 1a: Please enter the message: Hi

C PROGRAMMING !!!!!!

image text in transcribedimage text in transcribed

Below are some example interactions with the program. Your code should produce the same results: Example 1a: Please enter the message: Hi MOM! Should the message be encrypted of decrypted? E The encrypted message is: Ik QTS! Example 1b: Please enter the message: Ik QTS! Should the message be E> encrypted of p> decrypted? The encrypted message is: Hi MOM! Example 2a: Please enter the message: aaaaaaaaaaaaaaaaaaaa Should the message be encrypted of p> decrypted? The encrypted message is: bcdefghijklmnopqrstu Example 2b: Please enter the message: bcdefghijklmnopqrstu Should the message be decrypted? E The encrypted message is: Challenge: Implement Myre's Encryption Scheme for Super Security (MESSS) MESSS is just like MESS except that it reverses the message before encrypting it. Your task for this lab is to create a program that encrypts and decrypts messages using the Myre's Encryption Scheme for Security (MESS). MESS encrypts a message by "rotating" each alphabetical character by their position in the message. For example, consider the string "abc". When encrypted using MESS, it becomes "bdf". Since the 'a' is the first character in the message, it is rotated 1 letter to 'b' The second character, 'b', is rotated 2 letters to 'd' and 'c' , the third character, is rotated 3 letters to ' f . MESS always keeps alphabetical characters in the alphabet. So the word "zoo" encrypted is "agr". Notice that thez , wrapped around to a. Lowercase letters wrap to lowercase and uppercase letters wrap to uppercase. MESS leaves all (non-English) alphabetic characters alone For example, "BYE 'Zoomer, ' ', is encrypted to "CAH 'Fvwvoc'". Z was rotated 6 positions to F. The punctuation is NOT modified and each maintains its position within the string Your program should: Prompt the user to enter a message. Assume that a message will be up to (but no longer than) 500 characters. Prompt the user as to whether to encrypt or decrypt the message. Display the modified (decrypted/encrypted) message. . Note that the code you have been given above only "attempts" to encrypt a message. Additional code needs to be provided. You will likely find it easier to implement the algorithm one piece at a time. That is, break the problem into smaller, manageable pieces that can each be tested

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions

Question

8. Explain the relationship between communication and context.

Answered: 1 week ago

Question

d. How were you expected to contribute to family life?

Answered: 1 week ago