Question: Need help with code for ALL these programs which are below. Sorry if this is a repeat question. Anyways, this was all the information I

Need help with code for ALL these programs which are below. Sorry if this is a repeat question. Anyways, this was all the information I was given on each of these program problems. Do keep in mind all the code needs to be in C#

  1. Implement a program in C# that satisfies the following:
  • Encrypts the message below (the clear text) using a Ceaser cipher, Transposition cipher and Vignere Cipher.
  • Clear text: This is a private encrypted message Keys:
  • Ceaser Cipher: 15
  • Transposition Cipher (4 lines, line = charindex mod 4)
  • Substitution Cipher: ZYXWVUTSRQPONMLKJIHGFEDCAB
  • Vignere Cipher: SECURITY

Vignere: "THERE TX SYDTM PX QWBOZRH "

  1. Decrypts a message using Ceaser cipher, Transposition cipher and Vignere Cipher using the same keys as above. Encrypted strings and keys are below:
    1. Ceaser Cipher encrypted string = HDUILPGT HTRJGXIN XH WPGS
    2. Transposition Cipher encrypted string =

IEUBOIPI

NSCLFSOB

DTTETISL

ERASWMSE

  1. Substitution Cipher encrypted string = SZXPVIH ZIV GVMZXRLFH
  2. Vignere Cipher encrypted string = "LLGLV BQ QQHVG GF JUTSBLY "

Keys

  • Ceaser Cipher: 15
  • Transposition Cipher (4 lines, line = charindex mod 4)
  • Substitution Cipher: ZYXWVUTSRQPONMLKJIHGFEDCAB
  • Vignere Cipher: SECURITY

Vignere: "THERE TX SYDTM PX QWBOZRH " 2. Implement a program in C# to sign a document. The program will be able to generate a public key pair, accept a document and compute the hash. It then encrypts the has using the private key. The program will be able to verify a signature by accepting an encrypted signature (hash) and a document. It computes the hash, decrypts the encrypted hash and compares the hashes. It reports if the document is valid or not. Note, C# provides the necessary cryptographic primitives. Use ONLY the hash and public key encryption functions, i.e. write your own digital signature functions.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!