Question: In this lab, we will design and develop a class that can accept a message as a string and then encrypt / decrypt the message

In this lab, we will design and develop a class that can accept a message as a string and then encrypt/decrypt the message using the Caesar Cipher.
A cipher is an algorithm for encrypting data. Encryption is the process of transforming some plain text (text that is readable by humans) into ciphertext (text that is scrambled and unreadable). Many ciphers exist and are used in all areas of computer security. Things that are secured by ciphers include messages you send to your friends over Discord/Facebook, your login information when it is sent from your device to the web server youre connecting to, files you download from the internet, and files you have stored on your hard drive (Windows has encryption software built into it to secure your data).
In this lab, we will use the following terminology:
1. Plain Text text that needs to be encrypted.
2. Cipher Text text that has already been encrypted.
3. Encrypt The process of transforming plain text into cipher text.
4. Decrypt The process of transforming cipher text into plain text.
5. Encryption Algorithm The algorithm that is used to encrypt/decrypt text. The decryption algorithm is typically the reverse of the encryption algorithm.
6. Secret Key (often referred to as key) A special value that is used by the encryption algorithm to modify the text.
The oldest known cipher is the Caesar Cipher, which was developed and used by the Romans to send messages secretly. The Caesar Cipher algorithm works by taking each letter in the plain text and changing it to another letter in the alphabet based off the shift key. The shift key is an integer that determines what each letter will change to when a message is being encrypted. For example, if our key

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!