Question: In Java Exercise 1 Description You will be writing a simple Java program that implements ROT-13 called a Caesar cipher (after Julilus Caesar, who reportedly

In Java
 In Java Exercise 1 Description You will be writing a simple
Java program that implements ROT-13 called a Caesar cipher (after Julilus Caesar,
who reportedly used it to send messages to his ar alphabet. So

Exercise 1 Description You will be writing a simple Java program that implements ROT-13 called a Caesar cipher (after Julilus Caesar, who reportedly used it to send messages to his ar alphabet. So for example if we had a shift of 3 we might have the following replacements: 13 encryption. ROT-13 s a very simple encryption scheme that can be used to obfuscate test and is based on a very old encrysption technigue in a message are replaced by the letters of a "shited Original alphabet ASCOEFGHIKLRNOPORSTUwwx shifted alphabetDEFGRIOKLRNOPORSTUVWEYZASC Punctuation, numbers, and other non-alphabetic characters are unaffected by the shrt. where the So the message EAT ADOS Ar i or txcones "tow ow Mini:00 ROT 13 is special ase of the car ar core s of the new alphabet are shifted (or "rotated") by 13 positions from the original alphabet origlaal alphabet, A.CO"6" , K 1-ROPORsrevwXY1 So in the case of ROT-13, the message "EAT AT JOE'S AT 1:00" becomes "RNG NG WERY NG 1:00 Unike the general case of the Caesar oiper, ROT-13 has a special property that an ecrypled message can be decrypted by applying ROT-13 a second time. So the message "RING NG WBRF NG 1:00becomes "EAT AT JOE'S AT 1:00 when passed through a ROT-13 encryption. You will be writing a Java program that takes an arbitrary string as input, applys ROT13 to the string, and displays the results in a specific format. The code must work for uppercase and lowercase letters and must work correctly if punctuation and numbers are included in the message A skeleton of this code is provided in the file gren in the nstructem a ove %, ma-that ehe ear-ehe-e the ded S in this file with no code provided. You must fill in the appropriate code. Pay close attention to what exth method shoukd be doing based on the information given is the comments before the method You may add more methods to this skeleton if you feel that it would be useful, but you MUST indlude code for all of the methods in the to receive full credit Exercise 1 Sample Output This is a sample transcript of what your program should do. Text in bold is expected input from the user rather than output from the program. ENCRYPTED THE QUECK FOPE OVER THE LAY

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!