Question: Create one program with both parts below. Be sure to copy your program into a . txt file for submission, with the output at the

Create one program with both parts below. Be sure to copy your program into a .txt file for submission, with the output at the bottom. DON'T USE ANY CONDITIONAL CONTROL FLOW DIRECTIVES.
As with last week, you can start with the project sample in the C:\Irvine folder for each and then just change the names.
A. Start with the encryption program in Section 6.2.4 and revise it in the following manner: Create and encryption key consisting of multiple characters. Use this key to encrypt and decrypt the plaintext by XOR(ing) each character of the key against a corresponding byte in the message. Repeat the key as many times as necessary until all plain text bytes are translated.
B. Use the following key: "AGZmy#4". This is how the key would align with the plain text bytes:
T h i s i s a P l a i n t e x t m e s s a g e (etc)
A G Z m y # 4 A G Z m y # 4 A G Z m y # 4 A G Z m y # 4 A
C. Hard code the above key and the message. Do not prompt the user.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!