Question
PLEASE SEE INSTRUCTIONS BELOW. I have included a text file to be used. Also, I'm not sure how to do a preprocess. This may be
PLEASE SEE INSTRUCTIONS BELOW. I have included a text file to be used. Also, I'm not sure how to do a preprocess. This may be done in C, C++, or Java.
The Vigenere CBC encipher needs a key and an IV. For this assignment, you would allow the user to enter a key (key length ranges from 2 to 10) and an IV with the same length as key. You may want to mandate that the length of IV should be the same as the key. Inputs to the Vigenere CBC decipher should be the same key and IV, as well as the ciphertext. The ciphertext sequence should be generated by the Vigenere CBC encipher.
create two programs: one for the encipher (including the preprocessing) and one for the decipher. The outputs of the encipher program should include the following:
Original text file name
Key
IV
Block size
Plaintext (after preprocessing) printed on the screen
Number of characters in plaintext (before padding)
Ciphertext printed on the screen
Name of ciphertext file (ciphertext saved to a file)
Number of padding characters
The ciphertext file will be used as one of the inputs to the decipher. The outputs of the decipher program should include the following:
Ciphertext file name
Number of characters in ciphertext
Recovered plaintext printed on the screen
TEXT FILE IS:
Cipher block chaining (CBC) is a mode of operation for a block cipher (one in which a sequence of bits are encrypted as a single unit or block with a cipher key applied to the entire block). Cipher block chaining uses what is known as an initialization vector (IV) of a certain length. One of its key characteristics is that it uses a chaining mechanism that causes the decryption of a block of ciphertext to depend on all the preceding ciphertext blocks. As a result, the entire validity of all preceding blocks is contained in the immediately previous ciphertext block. A single bit error in a ciphertext block affects the decryption of all subsequent blocks. Rearrangement of the order of the ciphertext blocks causes decryption to become corrupted.
Then the encipher will use these letter sequences as the plaintext input. This is an example of what the printscreen should look like after preprocess(This is an example) Text file to be used is above.
ireturnedfromthecityaboutthreeoclockonthatmayafternoonprettyw elldisgustedwithlifeihadbeenthreemonthsintheoldcountrvandwasfe dupwithitifanyonehadtoldmeayearagothatiwouldhavebeenfeelingli kethatishouldhavelaughedathimbuttherewasthefacttheweathermad emeliverishthetalkoftheordinaryenglishmanmademesickicouldntge tenoughexerciseandtheamusementsoflondonseemedasflatassodaw aterthathasbeenstandinginthesunrichardhannayikepttellingmyselfy ouhavegotintothewrongditchmyfriendandyouhadbetterclimbout ireturnedfromthecityaboutthreeoclockonthatmayafternoonprettyw elldisgustedwithlifeihadbeenthreemonthsintheoldcountrvandwasfe dupwithitifanyonehadtoldmeayearagothatiwouldhavebeenfeelingli kethatishouldhavelaughedathimbuttherewasthefacttheweathermad emeliverishthetalkoftheordinaryenglishmanmademesickicouldntge tenoughexerciseandtheamusementsoflondonseemedasflatassodaw aterthathasbeenstandinginthesunrichardhannayikepttellingmyselfy ouhavegotintothewrongditchmyfriendandyouhadbetterclimboutStep by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started