Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Task 3 Assembly programmingWrite an assembly language program for the WASP processor using the Sting assembler.Your assembly program should allow the user to encrypt a

Task 3Assembly programmingWrite an assembly language program for the WASP processor using the Sting assembler.Your assembly program should allow the user to encrypt a message using a Caesar Cipher.A Caesar Cipher is a simple and well-known way to encrypt text. To use it, you first pick a number(called the shift. For example, 3). Then every letter in the message has that number added to it, tomove it forward in the alphabet. For example, in this case, A becomes D.B becomes E andso on. For numbers at the end of the alphabet, the letters start again from the beginning. In thisexample the letter X would become A and the letter Y would become B.Using a shift of 3, the text YELLOW SUBMARINE becomes BHOORZ VXEPDULQH.Your program will work as follows:1. Allow the user to type in a single digit for the shift. The shift will be between 0 and 9. Yourprogram will store the number in a variable. You do not need to handle shifts larger than 9.2. The user will type text into the console. This will be converted to the encrypted text anddisplayed on the screen.3. The program will work for both upper- and lower-case characters. The program will notchange spaces, digits, or other symbols.4. The program will halt once it has displayed a line of text. (Check for the new line character.)For example, if the user enters a shift of 7, then enters Good morning, Mr. Turing! your programwill display:Nvvk tvyupun, Ty. Abypun write the code please with instruction on how to run it its based on sting assembler using wasp here is a simple code to explain the syntax : MOV BX,0x0MOV AX,[0xA0]ADD BX,AXMOV AX,[0xA1]ADD BX,AXMOV AX,[0xA2]ADD BX,AXMOV AX,[0xA3]ADD BX,AXDIV BX,0x04MOV [0xA4],BXHALT
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Intelligent Information And Database Systems Asian Conference Aciids 2012 Kaohsiung Taiwan March 19 21 2012 Proceedings Part 3 Lnai 7198

Authors: Jeng-Shyang Pan ,Shyi-Ming Chen ,Ngoc-Thanh Nguyen

2012th Edition

3642284922, 978-3642284922

More Books

Students also viewed these Databases questions

Question

How is the NDAA used to shape defense policies indirectly?

Answered: 1 week ago