Question: Create one program with both parts below. Be sure to copy your program into a . txt file for submission, with the output at the
Create one program with both parts below. Be sure to copy your program into a txt file for submission, with the output at the bottom. DON'T USE ANY CONDITIONAL CONTROL FLOW DIRECTIVES.
As with last week, you can start with the project sample in the C:Irvine folder for each and then just change the names.
A Start with the encryption program in Section and revise it in the following manner: Create and encryption key consisting of multiple characters. Use this key to encrypt and decrypt the plaintext by XORing each character of the key against a corresponding byte in the message. Repeat the key as many times as necessary until all plain text bytes are translated.
B Use the following key: "AGZmy# This is how the key would align with the plain text bytes:
T h i s i s a P l a i n t e x t m e s s a g e etc
A G Z m y # A G Z m y # A G Z m y # A G Z m y # A
C Hard code the above key and the message. Do not prompt the user.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
