Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Caesar Cipher Programming Project... Can be done in any high level programming language such as: Cpp, Java, Python Need to allow for: Ask for users

Caesar Cipher Programming Project...
Can be done in any high level programming language such as: Cpp, Java, Python
Need to allow for:
Ask for users last name
Ask for string to encrypt image text in transcribed
3.0 Project Functionality 3.1 Overview The primary objective of this project is to implementation of Vigenere Cipher. You have to design and develop a C/CPP/JAVA -based program to encrypt any given message based on the Vignere algorithm. Your last name must be used as the cipher key. You also have to skip the space between the words, while replicating the key to cover the entire message. You can find an example of how the below message has been encrvpted using my last name as the cipher kev increase your understanding of the fundamental A HEALTHY ATTITUDE IS CONTAGIOUS BUT DONT WAIT TO CATCH IT FROM OTHERS. + mod 26) K HOSHAVI KHOSHAVI KH OSHAVIKHOS HAV IKHO SHAV IK HOSHA VI KHOS HAVIKH 3.2 Test Cases The following messages will be given as the input as the test case to your program to check the accuracy of your program A HEALTHY ATTITUDE IS CONTAGIOUS BUT DONT WAIT TO CATCH IT FROM OTHERS. -IF YOU CARRY YOUR CHILDHOOD WITH YOU YOU NEVER BECOME OLDER -FROM PRINCIPLES IS DERIVED PROBABILITY BUT TRUTH OR CERTAINTY IS OBTAINED ONLY FROM FACTS 4.0 Program Code Evaluation 4.1 Evaluation Method Project Code scores will be evaluated by entering aforementioned "stress-test" sentences. Any missing, incorrect, or extra unspecified functionality will result in a proportional or complete deduction of credit 4.2 Operational Code Required Any compiler errors (e.g. gcc or javac is unable to compile the program code), as well as program runtime failures or infinite loops will result no credit for affected parts of the Program Code for this Project. Please verify that your submission is operational prior to final submission. 4.3 Individual Work The entire submission of Program Code and Project Report shall be your own individual original work. Any unauthorized use of shared, jointly written, or re-used code results in no credit for the entire Project

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Concepts of Database Management

Authors: Philip J. Pratt, Mary Z. Last

8th edition

1285427106, 978-1285427102

Students also viewed these Databases questions