Question: Assignment 2- Caesar Cipher Introduction Your second assignment will consist ofa decryption problem. Some encrypted text will be be provided and your job is to

 Assignment 2- Caesar Cipher Introduction Your second assignment will consist ofadecryption problem. Some encrypted text will be be provided and your job

Assignment 2- Caesar Cipher Introduction Your second assignment will consist ofa decryption problem. Some encrypted text will be be provided and your job is to write a C program to decrypt it. As always, the C program should submitted as a standard C source code file. Please note that the computer program should comply with the commenting and formatting rules as described in class. For example, there should be a header for the whole program that gives the author's name, class name, date, and description. End braces should be commented, and there alignment and indenting requirements as discussed. Please ask if you have any questions Please provide your p seudocode as a separate Word, Dxt, or PDF file. Program 1: Caesar Cipher In cryptography, a Caesar Cipher is one ofthe simplest and most widely known encryption a techniques. It is a type ofsubstitution cipher in which each letter in the plaintext is replaced by letter some fixed number of positions down the alphabet. For example, with a left shift of 3, D would be replaced by A, E would B, so on. The method is named after Julius cipher) and Caesar, who used it in his private correspondence. ABC DEF G H A B C D E F Caesar the encryption is performed against a key string, which is often just the 26 letters alphabet. An value is defined that consists of a positive or negative integer. of the The plaintext (the normal text encrypted, one letter time, by using that offset value in the following way: (a) the index position within the key string of the letter to be encrypted is determined, (b) the offset value is applied to that index in order to obtain a new index within the key string, (c) the character at the new index is written as the For a simple example, let's assume the key string consists of the 26 letters of the alphabet plus a space

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!