Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Write a C program that decrypts a file named encrypted.txt and places the decryption output to a file called decrypted.txt. A file encrypted with k

Write a C program that decrypts a file named encrypted.txt and places the decryption output to a file called decrypted.txt. A file encrypted with k = (5, 7) is provided with the assignment. You can use it to test your decryption function. You will know when you have succeeded because the text becomes readable.
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
Asisple way of fish the inverw ofaistoew .akers h@ I se @dwewhich one satiks Mtion which ws back to ltter Sample Code Executkm: Rrd text indicates "hrmatn oatend by t uwr ater the decryptsos bey rene key ater the decryptsos beys 7 Doyou want to reencrypt tho file (y/u), y Ester an encryptie Fle encrypted Goodbye encrypted bibox whx, nb rqhulb yqb nzokw, mdy yz rqhulb yqb nzokw vu h nhx yqhy pbhut huxyqvul, yqhy yhfbt pzob yvpb yqhu pzty ebzekb qhib. vy ubibo qheebut hkk hy zurb. vy't tkzn. vy't pbyqzwvrhk. vy't bsqhdtyvl nb wzu'y hkk qhib yqb tyzphrq gzo vy whbpzut, yqbx rhkk yqbp. yqbx ebogzop hryvzu nvyqzdy dtbo vuybohryvzu. pzuvyzovul, kzllvul, uzyvgvrhyvzut. eovphk dolbt, obeobttbw pbpzovbt, durzutrvzdt ghmvyt. yqbx' ob hknhxt yqbob, hknhxt hryvib. nb rhu yox yz mb ovlgy, nb rhu yox yz mb 1zzw. nb rhu yox yz phfb h wvggboburb, mdy vy't hkk h kvb. rhdtb vuybuyvzut hob voobkbihuy. yqbx wzu'y wovib dt. whbpzut wz. pzty rzwbot yqvuf wbmdllvul tzgynhob vt hmzdy gvsvul h pvtyhfb, mdy yqhy't uzutbut. wbmdllvul't hrydhkkx hkk hmzdy gvuwvul ygb mdl, hmzdy duwbotyhuwvul nqx yqb mdl nht yqbob yz mblvu nvyq, hmzdy fuznvul yqhy vyt wbkvibo h pbtthlb, kvfb hu durzutrvzdt mdmmkb gkzhyvul yz yqb tdoghrb, ezeevul nvyq h obibkhyvzu xzd'ib tbrobykx fuznu hkk hkzul h tvpekb eozlohp, h nzop yqhy rhu phfb whyh duobhwhmkb, phknhob yqhy yzzf Whokbub phxmb ynz qzdot yz rzwb. vt yhy obhkkx hkk vy yhfbt yz fvkk yqb nzokw? yqb rzurbey zg nhvyvul mbnvkwbot pb. yqbob hob hknhxt wbhwkvubt. yqbob hob hknhxt yvrfvul rkzrft. yqhy't nqx xzd pdty phuhlb xzdo yvpb. tdob, yqbob hob lohxt, mdy ngbu xzd rzpb ovlqy wznu yz vy, hy vyt rzob, mbubhyq bibox rqzvrb, yqbob't bvyqbo h zub zo h cboz. xzd bvyqbo wz tzpbyqvul zo xzd wzu'y. xzd nhkf zdy yghy wzzo, xzd.ib wbrvwbw yz wz uzyqvul, ths uz , nqvrq pbhut xzd wz uzy rzpb mhrf. xzd kbhib, xzd hob uz kzulbo h ehoy zg yqvt. xzd mbrzpb h nzokw, xzd mbrzpb h xbt. xzd mbrzpb h zub. tz, rqzvrbt. phxmb po. ozmzy't ovlqy. yghy t nhy yqvt vt hkk hmzdy, yqb xbttbt huw uzt zg kvgb mdy wz nb wbrvwb yqbp zo wz yqbx wbrvwb dt? 1 Affine Cipher (70 points) The Affine cipher is a cryptographic method for encrypting text such that it becomes unreadable to a party without access to the cryptographic key. The encryption and decryption operations are simple shifts of the alphabet letters in a cyclic fashion. Mathematically, for a key k (a, B), the encryption and decryption are defined as: Encryption: c = (a-z+ ) mod 26 , 1

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Inductive Databases And Constraint Based Data Mining

Authors: Saso Dzeroski ,Bart Goethals ,Pance Panov

2010th Edition

1489982175, 978-1489982179

More Books

Students also viewed these Databases questions

Question

Does it use a maximum of two typefaces or fonts?

Answered: 1 week ago