Question: In assembly language please. Do not use Irvine 3 2 library or any other library. Only use instructions that are covered in chapters 5 -
In assembly language please. Do not use Irvine library or any other library. Only use instructions that are covered in chapters in Irvine. Also do not use: MOVSB, MOVSW, MOVSD, CMPSBCMPSWCMPDSCASB, SCASW, SCASD,STOSB, STOSW, STOSD, LODSB, LODSW, and LODSD. You are not allowed to use Conditional Directives. Only write the assembly part and avoid using directives. Write only one procedure that does the job.
points Write Assembly code only assembly code and no procedure call that performs decryption recovers the original string of an encrypted string. The encryption is performed by rotating each plaintext byte a varying number of positions in different directions. For example, in the following array that represents the encryption key, a negative value indicates a points Write Assembly code only assembly code and no procedure call that
performs decryption recovers the original string of an encrypted string. The encryption is
performed by rotating each plaintext byte a varying number of positions in different
directions. For example, in the following array that represents the encryption key, a negative
value indicates a rotation to the left and a positive value indicates a rotation to the right.
The integer in each position indicates the magnitude of the rotation: key BYTE
Encryption algorithm rotates each plaintext byte by the amount indicated by its matching
key array value. Then, align the key to the next bytes of the message and repeat the
process. Please note that the program is not allowed to define any new data labels
variables
Here is a sample call:
data
mesg BYTE "I wish you all the success! ; this is the encrypted message also will hold
the decrypted message later
key BYTE rotation to the left and a positive value indicates a rotation to the right. The integer in each position indicates the magnitude of the rotation: key BYTE Encryption algorithm rotates each plaintext byte by the amount indicated by its matching key array value. Then, align the key to the next bytes of the message and repeat the process.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
