Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Introduction to Programming in CIELEC129 You work for a computer security software company. Your new dient needs a new encryption system to send les containing

image text in transcribed

Introduction to Programming in CIELEC129 You work for a computer security software company. Your new dient needs a new encryption system to send les containing important confidential information Encryption is the process of transforming information the message) using an algorithm to make it unreadable to anyone except those possessing special knowledge the keyl, which is available only to the legitimate users of the information Given the nature of your client's confidential information, it can only be sent in plain text format. To protect the confidentiality of the information, the Chief Engineer has proposed an encryption method that uses a numerical key to change the letters/characters (ASCII codes of the message based on the following expression: encrypted[/= message ] + keyl The following example uses the numerical key 1234 to encrypt the message helle, which would lead to the encrypted text igapp: Message(char): Key(int): Encrypted char) henID 12341 igo PP Note that, when the message to be encrypted is longer than the key, some numbers of the key may need to be repeated (eg, 123412341.) In order to match the length of the message Similarly, some numbers may need to be discarded if the key is longer than the message. You have been tasked with the creation of an encryption program based on the method above The program should be able to read the message and the key from separate text files, and save the encrypted text in a new text file. The program should also be able to recover the original message from an encrypted text file provided that the key is known) and save it to a file The program should first prompt the user to indicate the desired operation either encryption or decryption, the name of the input file message file in the case of encryption, or encrypted file in the case of decryption, the name of the file containing the numerical key for both encryption and decryption, and the name of the output file (encrypted file in the case of encryption, or message file in the case of decryption Your program should be robuste, when a file cannot be opened an error message should be displayed and the situation should be properly handled by the program Create a text file and use your program to encrypt and decrypt it. Show the results by means of some screenshots) in the test part of your report Introduction to Programming in CIELEC129 You work for a computer security software company. Your new dient needs a new encryption system to send les containing important confidential information Encryption is the process of transforming information the message) using an algorithm to make it unreadable to anyone except those possessing special knowledge the keyl, which is available only to the legitimate users of the information Given the nature of your client's confidential information, it can only be sent in plain text format. To protect the confidentiality of the information, the Chief Engineer has proposed an encryption method that uses a numerical key to change the letters/characters (ASCII codes of the message based on the following expression: encrypted[/= message ] + keyl The following example uses the numerical key 1234 to encrypt the message helle, which would lead to the encrypted text igapp: Message(char): Key(int): Encrypted char) henID 12341 igo PP Note that, when the message to be encrypted is longer than the key, some numbers of the key may need to be repeated (eg, 123412341.) In order to match the length of the message Similarly, some numbers may need to be discarded if the key is longer than the message. You have been tasked with the creation of an encryption program based on the method above The program should be able to read the message and the key from separate text files, and save the encrypted text in a new text file. The program should also be able to recover the original message from an encrypted text file provided that the key is known) and save it to a file The program should first prompt the user to indicate the desired operation either encryption or decryption, the name of the input file message file in the case of encryption, or encrypted file in the case of decryption, the name of the file containing the numerical key for both encryption and decryption, and the name of the output file (encrypted file in the case of encryption, or message file in the case of decryption Your program should be robuste, when a file cannot be opened an error message should be displayed and the situation should be properly handled by the program Create a text file and use your program to encrypt and decrypt it. Show the results by means of some screenshots) in the test part of your report

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Oracle Database Administration The Essential Reference

Authors: Brian Laskey, David Kreines

1st Edition

1565925165, 978-1565925168

More Books

Students also viewed these Databases questions

Question

Draw a labelled diagram of the Dicot stem.

Answered: 1 week ago